Sciweavers

1290 search results - page 206 / 258
» Data Dependence Testing in Practice
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs
Abstract—Gold farming refers to the illicit practice of gathering and selling virtual goods in online games for real money. Although around one million gold farmers engage in gol...
Muhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Sr...
CSIE
2009
IEEE
14 years 3 months ago
On the Effectiveness of Collaborative Tagging Systems for Describing Resources
This article investigates the effectiveness of community generated tags as social descriptors of resources uncoordinatedly annotated by community members. Our goal is to demonstra...
Jinsheng Xu, Christo Dichev, Albert C. Esterline, ...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 3 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
ICASSP
2007
IEEE
14 years 3 months ago
Feature Selection Based on Fisher Ratio and Mutual Information Analyses for Robust Brain Computer Interface
This paper proposes a novel feature selection method based on twostage analysis of Fisher Ratio and Mutual Information for robust Brain Computer Interface. This method decomposes ...
Tran Huy Dat, Cuntai Guan
IMC
2005
ACM
14 years 2 months ago
Novel Approaches to End-to-End Packet Reordering Measurement
By providing the best-effort service, the Internet Protocol (IP) does not maintain the same order of packets sent out by a host. Therefore, due to the route change, parallelism in...
Xiapu Luo, Rocky K. C. Chang