Sciweavers

6885 search results - page 1316 / 1377
» The micro-structure of use of help
Sort
View
SASN
2006
ACM
14 years 4 months ago
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
This paper focuses on defending against compromised nodes’ dropping of legitimate reports and investigates the misbehavior of a maliciously packet-dropping node in sensor networ...
Suk-Bok Lee, Yoon-Hwa Choi
SIGUCCS
2006
ACM
14 years 4 months ago
Automated podcasting solution expands the boundaries of the classroom
A scalable podcast solution developed at the University of Washington makes the podcasting of class lectures easy for faculty by automating the capture, uploading, and delivery of...
David Aldrich, Bradley Bell, Tim Batzel
SIGUCCS
2006
ACM
14 years 4 months ago
Bridging the student support gap
In recent years, the use of a computer has become a requirement for success in a collegiate environment, and the demand for mobile computing has sharply increased. In response to ...
Gerald Bailey, Jamie Piperberg, Bud Hiller
SOUPS
2006
ACM
14 years 4 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
CIG
2005
IEEE
14 years 3 months ago
Forcing Neurocontrollers to Exploit Sensory Symmetry Through Hard-wired Modularity in the Game of Cellz
Several attempts have been made in the past to construct encoding schemes that allow modularity to emerge in evolving systems, but success is limited. We believe that in order to c...
Julian Togelius, Simon M. Lucas
« Prev « First page 1316 / 1377 Last » Next »