Sciweavers

1022 search results - page 155 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device
—Interaction with mobile devices that are intended for everyday use is challenging since such systems are continuously optimized towards small outlines. Watches are a particularl...
Roman Amstutz, Oliver Amft, Brian French, Asim Sma...
IWCMC
2006
ACM
14 years 1 months ago
Budgeting power: packet duplication and bit error rate reduction in wireless ad-hoc networks
In this paper we present and evaluate a new technique to lower packet-level error rates of application layer connections in wireless ad-hoc networks. In our scheme, data packets s...
Ghassen Ben Brahim, Bilal Khan
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
RSP
2008
IEEE
118views Control Systems» more  RSP 2008»
14 years 2 months ago
Functional DIF for Rapid Prototyping
Dataflow formalisms have provided designers of digital signal processing systems with optimizations and guarantees to arrive at quality prototypes quickly. As system complexity in...
William Plishker, Nimish Sane, Mary Kiemb, Kapil A...
ACMDIS
2006
ACM
14 years 1 months ago
An empirical framework for designing social products
Designers generally agree that understanding the context of use is important in designing products. However, technologically advanced products such as personal robots engender com...
Bilge Mutlu