Sciweavers

7766 search results - page 1402 / 1554
» Testing Nondeterminate Systems
Sort
View
SENSYS
2005
ACM
14 years 2 months ago
Sympathy for the sensor network debugger
Being embedded in the physical world, sensor networks present a wide range of bugs and misbehavior qualitatively different from those in most distributed systems. Unfortunately, d...
Nithya Ramanathan, Kevin K. Chang, Rahul Kapur, Le...
SOUPS
2005
ACM
14 years 2 months ago
Authentication using graphical passwords: effects of tolerance and image choice
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed...
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,...
WMASH
2005
ACM
14 years 2 months ago
A multimedia guidebook implementation using a bluetooth wireless information point network
This paper describes the implementation of a Bluetooth Village Guide Book (VGB) scenario for use in the Kelvin Grove Urban Village located in Brisbane, Australia. An Information P...
Matthew D'Souza, Adam Postula, Neil Bergmann, Mont...
CCS
2005
ACM
14 years 2 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
GECCO
2005
Springer
195views Optimization» more  GECCO 2005»
14 years 2 months ago
Evolving fuzzy decision tree structure that adapts in real-time
A fuzzy logic algorithm has been developed that automatically allocates electronic attack (EA) resources distributed over different platforms in real-time. The controller must be ...
James F. Smith III
« Prev « First page 1402 / 1554 Last » Next »