Sciweavers

162 search results - page 16 / 33
» Observation Strategy for Decision Making Based on Informatio...
Sort
View
CHI
2009
ACM
14 years 2 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
IWSOS
2009
Springer
14 years 2 months ago
Self-organized Evacuation Based on LifeBelt
Abstract. In this paper, we have investigated the feasibility of a selforganized evacuation process when compared with a centralized control. The evacuation strategy is based on â€...
Kashif Zia, Alois Ferscha
CEC
2009
IEEE
14 years 2 months ago
The multiobjective evolutionary algorithm based on determined weight and sub-regional search
— By dividing the multiobjective optimization of the decision space into several small regions, this paper proposes multi-objective optimization algorithm based on sub-regional s...
Hai-lin Liu, Xueqiang Li
SIGCSE
2002
ACM
114views Education» more  SIGCSE 2002»
13 years 7 months ago
Gender and information technology: implications of definitions
In this paper, we examine implications of definitions of information technology to women's participation in the industry and in academe. This paper is exploratory only, based...
Wendy L. Cukier, Denise Shortt, Irene Devine