Sciweavers

13383 search results - page 2499 / 2677
» Abstractions from proofs
Sort
View
PIMRC
2008
IEEE
14 years 5 months ago
Distributed scheduling with end-to-end compensation in multihop ad hoc networks
Abstract-In this paper, we investigate the problem of providing QoS to end-to-end flows in multihop ad hoc networks with channel errors through packet scheduling. Each flow is asso...
Yijiang Sun, Victor O. K. Li, Ka-Cheong Leung
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 5 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
ABIALS
2008
Springer
14 years 5 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
ACIVS
2008
Springer
14 years 5 months ago
Crowd Behavior Recognition for Video Surveillance
Abstract. Crowd behavior recognition is becoming an important research topic in video surveillance for public places. In this paper, we first discuss the crowd feature selection a...
Shobhit Saxena, François Brémond, Mo...
AH
2008
Springer
14 years 5 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson
« Prev « First page 2499 / 2677 Last » Next »