Sciweavers

7272 search results - page 1406 / 1455
» On the Performance of Selection Relaying
Sort
View
ACSW
2006
13 years 10 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
AVI
2004
13 years 10 months ago
Stitching: pen gestures that span multiple displays
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices with wireless networking by using pen gestures that span multiple displays. To st...
Ken Hinckley, Gonzalo Ramos, François Guimb...
AVI
2006
13 years 10 months ago
Shakespeare's complete works as a benchmark for evaluating multiscale document navigation techniques
In this paper, we describe an experimental platform dedicated to the comparative evaluation of multiscale electronic-document navigation techniques. One noteworthy characteristic ...
Yves Guiard, Michel Beaudouin-Lafon, Yangzhou Du, ...
DBSEC
2004
108views Database» more  DBSEC 2004»
13 years 10 months ago
Why Is this User Asking so Many Questions? Explaining Sequences of Queries
A sequence of queries submitted by a database user within a short period of time may have a single, illuminating explanation. In this paper we consider sequences of single-record q...
Aybar C. Acar, Amihai Motro
FLAIRS
2004
13 years 10 months ago
Recurrent Neural Networks and Pitch Representations for Music Tasks
We present results from experiments in using several pitch representations for jazz-oriented musical tasks performed by a recurrent neural network. We have run experiments with se...
Judy A. Franklin
« Prev « First page 1406 / 1455 Last » Next »