: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Intuitive use is met when prior knowledge is transferred to new task environments. The empirical fact that transfer relies on schemas led us to diagnose intuitiveness based on sch...
Traditional approaches of assessment in the medical domain are insufficient for evaluating trainees’ technical skills. Currently, many European medical training bodies are attem...
Dajie Zhang, Dietrich Albert, Cord Hockemeyer, Dor...
—In this paper we propose a model to compute an upper bound for the maximum network size in mobile ad-hoc networks. Our model is based on the foundation that for a unicast route ...
Michael Pascoe, Javier Gomez, Victor Rangel, Migue...
Abstract—We analyze the carrier sensing and interference relations between the two wireless links and measure the impact of these relations on link capacity in two indoor 802.11a...
Jeongkeun Lee, Sung-Ju Lee, Wonho Kim, Daehyung Jo...