NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference
CALDWELL, BETTYE; AND OTHERS
DESCRIBED AND EXEMPLIFIED IS A CODING SYSTEM FOR TRANSLATING ON-GOING BEHAVIOR OF CHILDREN AND ADULTS INTO A NUMERICAL LANGUAGE, THUS PERMITTING THE DATA TO BE SUMMARIZED AND ANALYZED BY COMPUTER. APPROACH IS BASED ON OBSERVATION. THE OBSERVER, WHO BECOMES PART OF THE ENVIRONMENT, REPORTS INTO A TAPE RECORDER THE RESPONSES OF THE MAIN FIGURE BEING…
Descriptors: Behavior, Behavior Patterns, Behavioral Science Research, Codification
Peer reviewed Peer reviewed
Moncrief, Lewis W. – Journal of Leisure Research, 1970
Descriptors: Attitudes, Behavior Patterns, Data Processing, Geographic Regions
Peer reviewed Peer reviewed
Yeany, Russell H.; Capie, William – Science Education, 1979
Presents a description of a set of data processing operations and an instrument for analyzing the teaching of data collection and manipulation. The functions and reliability of the Data Processing Observed Guide (DPOG) developed for this purpose are also included. (HM)
Descriptors: Behavior Patterns, Data Processing, Educational Assessment, Educational Research