Sciweavers

1912 search results - page 355 / 383
» On the evaluation of argumentation formalisms
Sort
View
SASN
2006
ACM
15 years 5 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
SIGCSE
2006
ACM
146views Education» more  SIGCSE 2006»
15 years 5 months ago
Introductory game creation: no programming required
Many incoming college freshmen have accumulated a significant number of hours of experience playing computer games. Extending that experience to actual game creation activities ca...
A. T. Chamillard
ICDCS
2005
IEEE
15 years 5 months ago
Controlling Gossip Protocol Infection Pattern Using Adaptive Fanout
We propose and evaluate a model for controlling infection patterns defined over rounds or real time in a gossipbased protocol using adaptive fanout. We model three versions of go...
Satish Verma, Wei Tsang Ooi
MM
2005
ACM
152views Multimedia» more  MM 2005»
15 years 5 months ago
Critical video quality for distributed automated video surveillance
Large-scale distributed video surveillance systems pose new scalability challenges. Due to the large number of video sources in such systems, the amount of bandwidth required to t...
Pavel Korshunov, Wei Tsang Ooi
SAC
2005
ACM
15 years 5 months ago
Towards the prioritization of regression test suites with data flow information
Regression test prioritization techniques re-order the execution of a test suite in an attempt to ensure that defects are revealed earlier in the test execution phase. In prior wo...
Matthew J. Rummel, Gregory M. Kapfhammer, Andrew T...