Sciweavers

1721 search results - page 107 / 345
» On Active and Passive Testing
Sort
View
ICWL
2009
Springer
15 years 11 months ago
Microblogging for Language Learning: Using Twitter to Train Communicative and Cultural Competence
Abstract. Our work analyzes the usefulness of microblogging in second language learning using the example of the social network Twitter. Most learners of English do not require eve...
Kerstin Borau, Carsten Ullrich, Jinjin Feng, Ruimi...
ICC
2008
IEEE
130views Communications» more  ICC 2008»
15 years 11 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
ICC
2007
IEEE
15 years 11 months ago
RARE - Resource Aware Routing for mEsh
— An important element of any routing protocol used for Wireless Mesh Networks (WMNs) is the link cost function used to represent the radio link characteristic. The majority of t...
Karol Kowalik, Brian Keegan, Mark Davis
ICPPW
2006
IEEE
15 years 10 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis