Sciweavers

474 search results - page 73 / 95
» Experience with Active Congestion Control
Sort
View
IWPC
2009
IEEE
14 years 4 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ATAL
2009
Springer
14 years 4 months ago
A self-organizing neural network architecture for intentional planning agents
This paper presents a model of neural network embodiment of intentions and planning mechanisms for autonomous agents. The model bridges the dichotomy of symbolic and non-symbolic ...
Budhitama Subagdja, Ah-Hwee Tan
DSD
2006
IEEE
93views Hardware» more  DSD 2006»
14 years 3 months ago
High-Level Decision Diagram based Fault Models for Targeting FSMs
Recently, a number of works have been published on implementing assignment decision diagram models combined with SAT methods to address register-transfer level test pattern genera...
Jaan Raik, Raimund Ubar, Taavi Viilukas
NORDICHI
2006
ACM
14 years 3 months ago
Systematic evaluation of e-learning systems: an experimental validation
The evaluation of e-learning applications deserves special attention and evaluators need effective methodologies and appropriate guidelines to perform their task. We have proposed...
Carmelo Ardito, Maria Francesca Costabile, Antonel...
HICSS
2011
IEEE
241views Biometrics» more  HICSS 2011»
13 years 1 months ago
Examining Work Performance in Immersive Virtual Environments versus Face-to-Face Physical Environments through Laboratory Experi
With increasing proliferation of virtual environments for serious work as well as play, we are confronted by new challenges pertaining to how such environments can be leveraged to...
Richard Bergin, Bryan J. Hudgens, Mark Nissen