Sciweavers

7134 search results - page 1305 / 1427
» A comparative study of map use
Sort
View
ECRIME
2007
14 years 2 months ago
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 2 months ago
Adaptive Power Loading for OFDM-Based Cognitive Radio Systems
Abstract--Cognitive radio (CR) technology is an innovative radio design philosophy which aims to increase spectrum utilization by exploiting unused spectrum in dynamically changing...
Gaurav Bansal, Md. Jahangir Hossain, Vijay K. Bhar...
ICDM
2007
IEEE
140views Data Mining» more  ICDM 2007»
14 years 2 months ago
Sequential Change Detection on Data Streams
Model-based declarative queries are becoming an attractive paradigm for interacting with many data stream applications. This has led to the development of techniques to accurately...
S. Muthukrishnan, Eric van den Berg, Yihua Wu
ALENEX
2008
180views Algorithms» more  ALENEX 2008»
13 years 11 months ago
Geometric Algorithms for Optimal Airspace Design and Air Traffic Controller Workload Balancing
The National Airspace System (NAS) is designed to accommodate a large number of flights over North America. For purposes of workload limitations for air traffic controllers, the a...
Amitabh Basu, Joseph S. B. Mitchell, Girishkumar S...
CIDR
2007
141views Algorithms» more  CIDR 2007»
13 years 11 months ago
Fragmentation in Large Object Repositories
Fragmentation leads to unpredictable and degraded application performance. While these problems have been studied in detail for desktop filesystem workloads, this study examines n...
Russell Sears, Catharine van Ingen
« Prev « First page 1305 / 1427 Last » Next »