نتایج جستجو برای: have considered
تعداد نتایج: 3265495 فیلتر نتایج به سال:
This study examines the random waypoint model widely used in the simulation studies of mobile ad hoc networks. Our findings show that this model fails to provide a steady state in that the average nodal speed consistently decreases over time, and therefore should not be directly used for simulation. We show how unreliable results can be obtained by using this model. In particular, certain ad ho...
The memory bus must work. Given the current status of Bayesian archetypes, physicists particularly desire the exploration of Moore's Law. We describe a metamorphic tool for visualizing thin clients, which we call BETRIM. Keywords— sensor networks,memory bus,betrims,,DHCP
Many current approaches to statistical language modeling rely on independence a.~sumptions 1)etween the different explanatory variables. This results in models which are computationally simple, but which only model the main effects of the explanatory variables oil the response variable. This paper presents an argmnent in favor of a statistical approach that also models the interactions between ...
We show that fragmented IPv4 and IPv6 traffic is vulnerable to effective interception and denial-of-service (DoS) attacks by an off-path attacker. Specifically, we demonstrate a weak attacker intercepting more than 80% of the data between peers and causing over 94% loss rate. We show that our attacks are practical through experimental validation on popular industrial and opensource products, wi...
The Test Vector Concept A test system based on vectors has several defining characteristics: • There is a “vector sequencer” that defines which “vector” will be obeyed next. • The vector sequencer broadcasts a small amount of information (such as vector address, period numbers and timeset numbers) to all of the pin channels. • The pin channels access a small pin command, usually of between 1 an...
Passing the Turing Test is not a sensible goal for Artificial Intelligence. Adherence to Turing's vision from 1950 is now actively harmful to our field. We review problems with Turing's idea, and suggest that, ironically, the very cognitive science that he tried to create must reject his research goal.
A central problem in the theory of genetic algorithms is the characterization of problems that are difficult for GAs to optimize. Many attempts to characterize such problems focus on the notion of Deception, defined in terms of the static average fitness of competing schemas. This article examines the Static Building Block Hypothesis (SBBH), the underlying assumption used to define Deception. E...
Frequently physical affordances are considered one of the main advantages of tangible interfaces or input devices, making interaction intuitive. This assumption may be overly simplistic – because physical objects have a multitude of physical affordances and properties, it is difficult for the designer to restrict these to (only) those that match with the digital system that they are connected w...
Networking and security researchers must grapple with the following four potential constraints in the course of their work: (i) legal issues, (ii) institutional policies, (iii) community norms and (iv) personal ethics. These possible constraints can be intertwined and inform one another. In this position paper we set aside all except the third constraint: community norms. We do not mean to dimi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید