Sciweavers

1517 search results - page 232 / 304
» On automatic knowledge validation for Bayesian knowledge bas...
Sort
View
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
AUTOMOTIVEUI
2009
ACM
14 years 3 months ago
A cognitive schema approach to diagnose intuitiveness: an application to onboard computers
Intuitive use is met when prior knowledge is transferred to new task environments. The empirical fact that transfer relies on schemas led us to diagnose intuitiveness based on sch...
Sandrine Fischer, Makoto Itoh, Toshiyuki Inagaki
CBMS
2008
IEEE
14 years 3 months ago
Developing Competence Assessment Procedure for Spinal Anaesthesia
Traditional approaches of assessment in the medical domain are insufficient for evaluating trainees’ technical skills. Currently, many European medical training bodies are attem...
Dajie Zhang, Dietrich Albert, Cord Hockemeyer, Dor...
GLOBECOM
2008
IEEE
14 years 3 months ago
An Upper Bound on Network Size in Mobile Ad-Hoc Networks
—In this paper we propose a model to compute an upper bound for the maximum network size in mobile ad-hoc networks. Our model is based on the foundation that for a unicast route ...
Michael Pascoe, Javier Gomez, Victor Rangel, Migue...
SECON
2007
IEEE
14 years 3 months ago
RSS-based Carrier Sensing and Interference Estimation in 802.11 Wireless Networks
Abstract—We analyze the carrier sensing and interference relations between the two wireless links and measure the impact of these relations on link capacity in two indoor 802.11a...
Jeongkeun Lee, Sung-Ju Lee, Wonho Kim, Daehyung Jo...