Sciweavers

3236 search results - page 462 / 648
» Designing better phages
Sort
View
AOSD
2004
ACM
14 years 4 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
MMDB
2004
ACM
132views Multimedia» more  MMDB 2004»
14 years 4 months ago
The priority curve algorithm for video summarization
In this paper, we introduce the concept of a priority curve associated with a video. We then provide an algorithm that can use the priority curve to create a summary (of a desired...
Marat Fayzullin, V. S. Subrahmanian, Massimiliano ...
MOBICOM
2004
ACM
14 years 4 months ago
Modeling mobility for vehicular ad-hoc networks
Without realistic modeling of node mobility, simulation evaluation of performance of mobile ad hoc networks may not correlate well with performance in a real deployment. In this p...
Amit Kumar Saha, David B. Johnson
SIGCOMM
2004
ACM
14 years 4 months ago
Comparison of routing metrics for static multi-hop wireless networks
Routing protocols for wireless ad hoc networks have traditionally focused on finding paths with minimum hop count. However, such paths can include slow or lossy links, leading to...
Richard Draves, Jitendra Padhye, Brian Zill
SIGCSE
2004
ACM
125views Education» more  SIGCSE 2004»
14 years 4 months ago
Agent-based cooperative learning: a proof-of-concept experiment
This paper presents an innovative multiagent system to support cooperative learning among students both in the real classrooms and in distance education. The system, called I-MIND...
Leen-Kiat Soh, Hong Jiang, Charles Ansorge