Sciweavers

2663 search results - page 22 / 533
» How to Choose a Timing Model
Sort
View
CHI
2009
ACM
14 years 10 months ago
Remembrance of things tagged: how tagging effort affects tag production and human memory
We developed a low-effort interaction method called Click2Tag for social bookmarking. Information foraging theory predicts that the production of tags will increase as the effort ...
Raluca Budiu, Peter Pirolli, Lichan Hong
DAC
2003
ACM
14 years 2 months ago
4G terminals: how are we going to design them?
Fourth-generation wireless communication systems (4G) will have totally different requirements than what front-end designers have been coping with up to now. Designs must be targe...
Jan Craninckx, Stéphane Donnay
MASCOTS
2001
13 years 11 months ago
How Does TCP Generate Pseudo-Self-Similarity?
Abstract--Long-range dependence has been observed in many recent Internet traffic measurements. In addition, some recent studies have shown that under certain network conditions, T...
Liang Guo, Mark Crovella, Ibrahim Matta
IJON
2007
93views more  IJON 2007»
13 years 9 months ago
How much can we trust neural simulation strategies?
Despite a steady improvement of computational hardware, results of numerical simulation are still tightly bound to the simulation tool and strategy used, and may substantially var...
Michelle Rudolph, Alain Destexhe
IWSEC
2007
Springer
14 years 3 months ago
Processing Multi-parameter Attacktrees with Estimated Parameter Values
Abstract. Authors extend the multi-parameter attacktree model to include inaccurate or estimated parameter values, which are modelled as probabilistic interval estimations. The pap...
Aivo Jürgenson, Jan Willemson