Sciweavers

15644 search results - page 3092 / 3129
» Brittle System Analysis
Sort
View
PRL
2006
221views more  PRL 2006»
13 years 8 months ago
Towards on-line saccade planning for high-resolution image sensing
This paper considers the problem of designing an active observer to plan a sequence of decisions regarding what target to look at, through a foveal-sensing action. We propose a fr...
Alberto Del Bimbo, Federico Pernici
SIGCSE
2008
ACM
166views Education» more  SIGCSE 2008»
13 years 8 months ago
Defense against the dark arts
Computer science faculty must attract and retain students by offering innovative courses that spark student interest, yet still teach core, computer science concepts. These effort...
Mark W. Bailey, Clark L. Coleman, Jack W. Davidson
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 8 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
IJDE
2007
123views more  IJDE 2007»
13 years 8 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
« Prev « First page 3092 / 3129 Last » Next »