Sciweavers

2564 search results - page 231 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ADHOC
2008
132views more  ADHOC 2008»
15 years 3 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
136
Voted
ICPR
2002
IEEE
16 years 4 months ago
Face Detection Using a Modified Radial Basis Function Neural Network
Face detection from cluttered images is very challenging due to the diverse variation of face appearance and the complexity of image background. In this paper, we propose a neural...
Lin-Lin Huang, Akinobu Shimizu, Hidefumi Kobatake
173
Voted
FPLAY
2008
15 years 5 months ago
Interactive accounting simulation environment for accounting education and training
In contrast to traditional teaching-and-learning environments whereby the teacher controls the learning (e.g., teacher-centered), video games present a learner-centered approach t...
Andrew Milner, Andrew Hogue, Bill Kapralos, John F...
CHI
2005
ACM
16 years 3 months ago
Interaction design for literature-based discovery
Rapid growth in the scientific literature makes it increasingly difficult for scientists to keep abreast of findings outside their own narrowing fields of expertise. To help biome...
Meredith M. Skeels, Kiera Henning, Meliha Yetisgen...
ACSE
2000
ACM
15 years 7 months ago
The information environments program - a new design based IT degree
The University of Queensland has recently established a new design-focused, studio-based IT degree at a new “flexible-learning” campus. The Bachelor of Information Environment...
Michael Docherty, Peter Sutton, Margot Brereton, S...