Sciweavers

2920 search results - page 566 / 584
» Finite information logic
Sort
View
RTAS
2006
IEEE
14 years 3 months ago
Scalable Modeling and Performance Evaluation of Wireless Sensor Networks
A notable features of many proposed Wireless Sensor Networks (WSNs) deployments is their scale: hundreds to thousands of nodes linked together. In such systems, modeling the state...
YoungMin Kwon, Gul Agha
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
CHI
2006
ACM
14 years 3 months ago
Perspective cursor: perspective-based interaction for multi-display environments
Multi-display environments and smart meeting rooms are now becoming more common. These environments build a shared display space from variety of devices: tablets, projected surfac...
Miguel A. Nacenta, Samer Sallam, Bernard Champoux,...
IWIA
2005
IEEE
14 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
SIGCSE
2005
ACM
163views Education» more  SIGCSE 2005»
14 years 3 months ago
Using SeSFJava in teaching introductory network courses
Networking course projects are usually described by an informal specification and a collection of test cases. Students often misunderstand the specification or oversimplify it t...
Tamer Elsharnouby, A. Udaya Shankar