Sciweavers

8699 search results - page 1656 / 1740
» Elements of the Theory of Computation
Sort
View
TDSC
2011
14 years 6 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
TALG
2010
158views more  TALG 2010»
14 years 5 months ago
Clustering for metric and nonmetric distance measures
We study a generalization of the k-median problem with respect to an arbitrary dissimilarity measure D. Given a finite set P of size n, our goal is to find a set C of size k such t...
Marcel R. Ackermann, Johannes Blömer, Christi...
CHI
2011
ACM
14 years 2 months ago
When designing usability questionnaires, does it hurt to be positive?
When designing questionnaires there is a tradition of including items with both positive and negative wording to minimize acquiescence and extreme response biases. Two disadvantag...
Jeff Sauro, James R. Lewis
CHI
2011
ACM
14 years 2 months ago
Starcraft from the stands: understanding the game spectator
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...
Gifford Cheung, Jeff Huang
HRI
2011
ACM
14 years 2 months ago
Human-robot proxemics: physical and psychological distancing in human-robot interaction
To seamlessly integrate into the human physical and social environment, robots must display appropriate proxemic behavior—that is, follow societal norms in establishing their ph...
Jonathan Mumm, Bilge Mutlu
« Prev « First page 1656 / 1740 Last » Next »