Sciweavers

1576 search results - page 203 / 316
» Periodic Merging Networks
Sort
View
130
Voted
FLAIRS
2008
15 years 5 months ago
Using Latent Semantic Analysis to Explore Second Language Lexical Development
This study explores how Latent Semantic Analysis (LSA) can be used as a method to examine the lexical development of second language (L2) speakers. This year long longitudinal stu...
Scott A. Crossley, Thomas L. Salsbury, Philip M. M...
120
Voted
DIMVA
2007
15 years 4 months ago
Measurement and Analysis of Autonomous Spreading Malware in a University Environment
Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
Jan Goebel, Thorsten Holz, Carsten Willems
138
Voted
ICVGIP
2004
15 years 4 months ago
A Framework for Activity Recognition and Detection of Unusual Activities
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...
Dhruv Mahajan, Nipun Kwatra, Sumit Jain, Prem Kalr...
149
Voted
MASCOTS
1993
15 years 4 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long
128
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
Residual white space distribution-based opportunistic channel access for cognitive radio enabled devices
We describe an opportunistic channel access scheme for cognitive radio-enabled secondary nodes (SNs). The proposed scheme uses the residual channel idle time distribution to estim...
Manuj Sharma, Anirudha Sahoo