Sciweavers

379 search results - page 51 / 76
» Usability testing: what have we overlooked
Sort
View
ACSW
2006
13 years 9 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
ECIS
2004
13 years 9 months ago
Forecasting ERP implementation success - Towards a grounded framework
The continuing soar in popularity when it comes to standardized information systems sold en masse under the labelling of Enterprise Resource Planning (ERP) Systems is somewhat kep...
Johan Magnusson, Andreas Nilsson, Fredrik Carlsson
ICCV
2007
IEEE
14 years 9 months ago
Depth-From-Recognition: Inferring Meta-data by Cognitive Feedback
Thanks to recent progress in category-level object recognition, we have now come to a point where these techniques have gained sufficient maturity and accuracy to succesfully feed...
Alexander Thomas, Vittorio Ferrari, Bastian Leibe,...
ACL
2010
13 years 5 months ago
A Rational Model of Eye Movement Control in Reading
A number of results in the study of realtime sentence comprehension have been explained by computational models as resulting from the rational use of probabilistic linguistic info...
Klinton Bicknell, Roger Levy
EC
2000
187views ECommerce» more  EC 2000»
13 years 7 months ago
Comparison of Multiobjective Evolutionary Algorithms: Empirical Results
In this paper, we provide a systematic comparison of various evolutionary approaches to multiobjective optimization using six carefully chosen test functions. Each test function i...
Eckart Zitzler, Kalyanmoy Deb, Lothar Thiele