Sciweavers

24680 search results - page 4752 / 4936
» Learning
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 2 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
HICSS
2003
IEEE
215views Biometrics» more  HICSS 2003»
14 years 2 months ago
A Field Study of Use of Synchronous Chat in Online Courses
A field study of Computer Mediated Communication (CMC) as used in higher education asks the questions, "Will students take part in synchronous chat sessions if they are sched...
David H. Spencer, Starr Roxanne Hiltz
ICRA
2003
IEEE
165views Robotics» more  ICRA 2003»
14 years 2 months ago
Multi-robot task-allocation through vacancy chains
Existing task allocation algorithms generally do not consider the effects of task interaction, such as interference, but instead assume that tasks are independent. That assumptio...
Torbjørn S. Dahl, Maja J. Mataric, Gaurav S...
INFOVIS
2003
IEEE
14 years 2 months ago
Between Aesthetics and Utility: Designing Ambient Information Visualizations
Unlike traditional information visualization, ambient information visualizations reside in the environment of the user rather than on the screen of a desktop computer. Currently, ...
Tobias Skog, Sara Ljungblad, Lars Erik Holmquist
ISCC
2003
IEEE
14 years 2 months ago
Fair Noiseless Broadcast Source Coding
We present a noiseless source coding problem in a broadcast environment and supply a simple solution to this problem. A transmitter wishes to transmit a binary random vector Ò ½...
Serdar Boztas
« Prev « First page 4752 / 4936 Last » Next »