Sciweavers

572 search results - page 93 / 115
» What do usability evaluators do in practice
Sort
View
NPL
2000
105views more  NPL 2000»
13 years 10 months ago
Online Interactive Neuro-evolution
In standard neuro-evolution, a population of networks is evolved in a task, and the network that best solves the task is found. This network is then fixed and used to solve future...
Adrian K. Agogino, Kenneth O. Stanley, Risto Miikk...
SAC
2008
ACM
13 years 10 months ago
The volume in focus: hardware-assisted focus and context effects for volume visualization
In many volume visualization applications there is some region of specific interest where we wish to see fine detail - yet we do not want to lose an impression of the overall pict...
Marcelo Cohen, Ken W. Brodlie, Nick Phillips
WINET
2010
179views more  WINET 2010»
13 years 9 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
GROUP
2010
ACM
13 years 8 months ago
Searching for reputable source code on the web
Looking for source code on the Web is a common practice among software developers. Previous research has shown that developers use social cues over technical cues to evaluate sour...
Rosalva E. Gallardo-Valencia, Phitchayaphong Tanti...
INFOCOM
2010
IEEE
13 years 8 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou