Sciweavers

635 search results - page 102 / 127
» Social Aspects of Information Security
Sort
View
CSREASAM
2006
13 years 11 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 9 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
AIED
2005
Springer
14 years 3 months ago
Cross-Cultural Evaluation of Politeness in Tactics for Pedagogical Agents
Politeness may play a role in tutorial interaction, including promoting learner motivation and avoiding negative affect. Politeness theory can account for this as a means of mitiga...
W. Lewis Johnson, Richard E. Mayer, Elisabeth Andr...
MHCI
2004
Springer
14 years 3 months ago
The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid
Sound is an important medium in our lives, but its ephemeral nature can be problematic when people cannot recall something they heard in the past. Motivated by everyday conversatio...
Gillian R. Hayes, Shwetak N. Patel, Khai N. Truong...