Sciweavers

11665 search results - page 1937 / 2333
» Human computing for EDA
Sort
View
71
Voted
VIZSEC
2005
Springer
15 years 5 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
WSTST
2005
Springer
15 years 5 months ago
Soft Modeling of Group Dynamics and Behavioral Attributes
: Social networks, religion and culture of human beings play a major role in the day-to-day activities performed by each individual in group oriented missions. The aggregation and ...
Soumya Banerjee, Ajith Abraham, Sang-Yong Han, P. ...
88
Voted
HUC
2005
Springer
15 years 5 months ago
A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping
The ubiquitous computing community has widely researched the use of 802.11 for the purpose of location inference. Meanwhile, Bluetooth is increasingly widely deployed due to its lo...
Anil Madhavapeddy, Alastair Tse
ACMACE
2004
ACM
15 years 5 months ago
A synthetic traffic model for Quake3
This paper presents our development of a synthetic traffic model for the interactive online computer game Quake3. The goal is a traffic model that can be used by researchers and I...
Tanja Lang, Philip Branch, Grenville J. Armitage
115
Voted
ACMDIS
2004
ACM
15 years 5 months ago
Jukola: democratic music choice in a public space
Jukola is an interactive MP3 Jukebox device designed to allow a group of people in a public space to democratically choose the music being played. A public display is used to nomi...
Kenton O'Hara, Matthew Lipson, Marcel Jansen, Axel...
« Prev « First page 1937 / 2333 Last » Next »