Sciweavers

257 search results - page 13 / 52
» Breaking Robert's Rules
Sort
View
PRESENCE
2006
99views more  PRESENCE 2006»
13 years 7 months ago
Analysis of Physiological Responses to a Social Situation in an Immersive Virtual Environment
An experiment was conducted in a Cave-like environment to explore the relationship between physiological responses and each of breaks in presence, and utterances by virtual charac...
Mel Slater, Christoph Guger, Guenter Edlinger, Rob...
TMI
1998
97views more  TMI 1998»
13 years 7 months ago
Optimization and FROC Analysis of Rule-Based Detection Schemes Using a Multiobjective Approach
Abstract—Computerized detection schemes have the potential of increasing diagnostic accuracy in medical imaging by alerting radiologists to lesions that they initially overlooked...
Mark A. Anastasio, Matthew A. Kupinski, Robert M. ...
WIMOB
2008
IEEE
14 years 2 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
CONEXT
2006
ACM
14 years 1 months ago
Autonomic policy-based management using web services
Network management requires a lot of manual work. Due to ongoing growth of the Internet, more self-management is needed in order to deal with the growing complexity. Policybased m...
Torsten Klie, Lars Wolf
EUC
2005
Springer
14 years 1 months ago
Application-Driven Customization of an Embedded Java Virtual Machine
Abstract. Java for embedded devices is today synonym of “embeddable pseudo-Java”. Embedded flavors of Java introduce incompatibilities against the standard edition and break i...
Alexandre Courbot, Gilles Grimaud, Jean-Jacques Va...