Sciweavers

73 search results - page 14 / 15
» An Approach to Analyzing the Need for Meta-Level Communicati...
Sort
View
DIGRA
2005
Springer
14 years 1 months ago
Beyond P-1: Who Plays Online?
Academics and industry professionals alike have long been interested in developing a nuanced and empirically sound typography of online gamers. Designers and engineers are aware o...
Avery Alix
MOBIHOC
2006
ACM
14 years 7 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
VSTTE
2005
Springer
14 years 1 months ago
Verifying Design with Proof Scores
: Verifying design instead of code can be an effective and practical approach to obtaining verified software. This paper argues that proof scores are an attractive method for ver...
Kokichi Futatsugi, Joseph A. Goguen, Kazuhiro Ogat...
FLAIRS
2007
13 years 10 months ago
Low-Effort Labeling of Network Events for Intrusion Detection in WLANs
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
CHI
2009
ACM
14 years 8 months ago
Blobby: how to guide a blind person
For the majority of blind people, walking in unknown places is a very difficult, or even impossible, task to perform, when without help. The adoption of the white cane is the main...
Hugo Nicolau, Joaquim A. Jorge, Tiago João ...