Sciweavers

13476 search results - page 2599 / 2696
» Learning from Streams
Sort
View
136
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
151
Voted
BIBM
2010
IEEE
158views Bioinformatics» more  BIBM 2010»
15 years 1 months ago
Protein-protein interaction prediction via Collective Matrix Factorization
Abstract--Protein-protein interactions (PPI) play an important role in cellular processes and metabolic processes within a cell. An important task is to determine the existence of ...
Qian Xu, Evan Wei Xiang, Qiang Yang
151
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
151
Voted
FECS
2010
236views Education» more  FECS 2010»
15 years 1 months ago
Development of a system for teaching CS1 in C/C++ with Lego NXT robots
This paper describes the development of a system for teaching C/C++ using a LegoTM NXT in a CSI college course on introductory programming. The programming of the NXT robot has be...
Amy Delman, Adiba Ishak, Lawrence Goetz, Mikhail K...
153
Voted
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
15 years 1 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
« Prev « First page 2599 / 2696 Last » Next »