Sciweavers

20807 search results - page 78 / 4162
» How to read a paper
Sort
View
ADHOC
2005
134views more  ADHOC 2005»
15 years 4 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
134
Voted
ACHI
2009
IEEE
15 years 11 months ago
How Applicable is Your Evaluation Methods - Really? Analysis and Re-design of Evaluation Methods for Fun and Entertainment
This paper presents an approach to analyze and re-design evaluation methods. The domain explored in this paper is evaluation methods for evaluating fun and entertainment. However,...
Charlotte Wiberg, Kalle Jegers, Heather Desurvire
CANDC
2007
ACM
15 years 6 months ago
All I really need to know (about creative thinking) I learned (by studying how children learn) in kindergarten
This paper argues that the “kindergarten approach to learning” – characterized by a spiraling cycle of Imagine, Create, Play, Share, Reflect, and back to Imagine – is idea...
Mitchel Resnick
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 4 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
IUI
2010
ACM
16 years 1 months ago
Personalized news recommendation based on click behavior
Online news reading has become very popular as the web provides access to news articles from millions of sources around the world. A key challenge of news websites is to help user...
Jiahui Liu, Peter Dolan, Elin Rønby Pederse...