Sciweavers

854 search results - page 150 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
CHI
2008
ACM
15 years 11 months ago
Blindsight: eyes-free access to mobile phones
Many mobile phones integrate services such as personal calendars. Given the social nature of the stored data, however, users often need to access such information as part of a pho...
Kevin A. Li, Patrick Baudisch, Ken Hinckley
LCC
1994
248views Algorithms» more  LCC 1994»
15 years 2 months ago
Comparing the Power of Monadic NP Games
The descriptive complexity of a problem is the complexity of describing the problem in some logical formalism. One of the few techniques for proving separation results in descripti...
Ronald Fagin
FLAIRS
2007
15 years 1 months ago
The Evolution and Evaluation of an Internet Search Tool for Information Analysts
We are working on a project aimed at building next generation analyst support tools that focus analysts’ attention on the most critical and novel information found within the da...
Elizabeth T. Whitaker, Robert L. Simpson Jr.
ALGORITHMICA
2010
154views more  ALGORITHMICA 2010»
14 years 11 months ago
On the Convergence of Multicast Games in Directed Networks
We investigate the convergence of the price of anarchy after a limited number of moves in the classical multicast communication game when the underlying communication networks is ...
Angelo Fanelli, Michele Flammini, Luca Moscardelli
ESORICS
2010
Springer
14 years 11 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...