Sciweavers

2701 search results - page 434 / 541
» Evaluation Issues
Sort
View
181
Voted
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ADHOCNOW
2011
Springer
14 years 8 months ago
Joint Duty Cycle Scheduling, Resource Allocation and Multi-constrained QoS Routing Algorithm
Wireless mesh sensor networks (WMSNs) have recently gained a lot of interest due to their communication capability to support various applications with different Quality of Service...
Jamila Ben Slimane, Yeqiong Song, Anis Koubaa, Mou...
AGI
2011
14 years 8 months ago
Comparing Humans and AI Agents
Comparing humans and machines is one important source of information about both machine and human strengths and limitations. Most of these comparisons and competitions are performe...
Javier Insa-Cabrera, David L. Dowe, Sergio Espa&nt...
CHI
2011
ACM
14 years 8 months ago
Classroom-based assistive technology: collective use of interactive visual schedules by students with autism
vSked is an interactive and collaborative assistive technology for students with autism, combining visual schedules, choice boards, and a token-based reward system into an integra...
Meg Cramer, Sen H. Hirano, Monica Tentori, Michael...
CSDA
2011
14 years 8 months ago
Error rates for multivariate outlier detection
Multivariate outlier identification requires the choice of reliable cut-off points for the robust distances that measure the discrepancy from the fit provided by high-breakdown...
Andrea Cerioli, Alessio Farcomeni