Sciweavers

872 search results - page 102 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
TDSC
2008
87views more  TDSC 2008»
13 years 7 months ago
Credit Card Fraud Detection Using Hidden Markov Model
Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for bo...
Abhinav Srivastava, Amlan Kundu, Shamik Sural, Aru...
TVCG
2008
95views more  TVCG 2008»
13 years 7 months ago
A Framework of Interaction Costs in Information Visualization
Interaction cost is an important but poorly understood factor in visualization design. We propose a framework of interaction costs inspired by Norman's Seven Stages of Action ...
Heidi Lam
SIGCSE
2002
ACM
128views Education» more  SIGCSE 2002»
13 years 7 months ago
Enhancing the quality of learning and understanding of first-year mathematics for computer science related majors
Most courses on Discrete Mathematics are designed to emphasize problem solving, in general. When the goal is to cover the content, the learning and understanding takes a second pl...
Francis Suraweera
COMSUR
2008
110views more  COMSUR 2008»
13 years 7 months ago
Service discovery for mobile ad hoc networks: A survey of issues and techniques
This paper surveys research in service advertising, discovery and selection for mobile ad hoc networks (MANETs) and related issues. We include a categorization of service discovery...
Christopher N. Ververidis, George C. Polyzos
ICIDS
2010
Springer
13 years 6 months ago
Crowd-Sourced AI Authoring with ENIGMA
Abstract. ENIGMA is an experimental platform for collaborative authoring of the behaviour of autonomous virtual characters in interactive narrative applications. The main objective...
Michael Kriegel, Ruth Aylett