Sciweavers

595 search results - page 38 / 119
» Session 7: Demonstrations
Sort
View
83
Voted
AEI
1999
60views more  AEI 1999»
15 years 14 days ago
Rule-base content verification using a digraph-based modelling approach
Ensuring that the content of a rule-base, which is being encoded, is free from problems of consistency, completeness, and conciseness, is necessary to avoid any performance errors...
G. S. Gursaran, S. Kanungo, A. K. Sinha
87
Voted
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 13 days ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
92
Voted
IJOE
2008
109views more  IJOE 2008»
15 years 9 days ago
Motor-Manipulatory Behaviours and Learning: an Observational Study
: In this paper we investigated the role of motor-manipulatory behaviour in the learning modalities of thirty-five primary school children interacting with a Lego MindStorms kit. I...
Eleonora Bilotta, Lorella Gabriele, Rocco Servidio...
149
Voted
PKAW
2010
14 years 11 months ago
MMG: A Learning Game Platform for Understanding and Predicting Human Recall Memory
How humans infer probable information from the limited observed data? How they are able to build on little knowledge about the context in hand? Is the human memory repeatedly const...
Umer Fareed, Byoung-Tak Zhang
113
Voted
VTC
2010
IEEE
121views Communications» more  VTC 2010»
14 years 11 months ago
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Mohamed Elsalih Mahmoud, Xuemin Shen