Sciweavers

595 search results - page 38 / 119
» Session 7: Demonstrations
Sort
View
AEI
1999
60views more  AEI 1999»
14 years 9 months ago
Rule-base content verification using a digraph-based modelling approach
Ensuring that the content of a rule-base, which is being encoded, is free from problems of consistency, completeness, and conciseness, is necessary to avoid any performance errors...
G. S. Gursaran, S. Kanungo, A. K. Sinha
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
14 years 9 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
IJOE
2008
109views more  IJOE 2008»
14 years 9 months ago
Motor-Manipulatory Behaviours and Learning: an Observational Study
: In this paper we investigated the role of motor-manipulatory behaviour in the learning modalities of thirty-five primary school children interacting with a Lego MindStorms kit. I...
Eleonora Bilotta, Lorella Gabriele, Rocco Servidio...
PKAW
2010
14 years 8 months ago
MMG: A Learning Game Platform for Understanding and Predicting Human Recall Memory
How humans infer probable information from the limited observed data? How they are able to build on little knowledge about the context in hand? Is the human memory repeatedly const...
Umer Fareed, Byoung-Tak Zhang
93
Voted
VTC
2010
IEEE
121views Communications» more  VTC 2010»
14 years 8 months ago
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Mohamed Elsalih Mahmoud, Xuemin Shen