Sciweavers

1292 search results - page 104 / 259
» A Designer's Guide to KEMs
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 2 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
14 years 2 months ago
Person tracking on a mobile robot with heterogeneous inter-characteristic feedback
— For a mobile robot that interacts with humans such as a home assistant or a tour guide robot, tracking a particular person among multiple persons is a fundamental, yet challeng...
Juhyun Lee, Peter Stone
GECCO
2007
Springer
164views Optimization» more  GECCO 2007»
14 years 2 months ago
Learning building block structure from crossover failure
In the classical binary genetic algorithm, although crossover within a building block (BB) does not always cause a decrease in fitness, any decrease in fitness results from the ...
Zhenhua Li, Erik D. Goodman
ICADL
2005
Springer
102views Education» more  ICADL 2005»
14 years 1 months ago
Concept Expansion Using Semantic Fisheye Views
Exploratory search over a collection often requires users to iteratively apply a variety of strategies, such as searching for more general or more specific concepts in reaction to ...
Paul Janecek, Vincent Schickel, Pearl Pu
WETICE
2000
IEEE
14 years 13 days ago
CVE Technology Development Based on Real World Application and User Needs
This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...