Sciweavers

3303 search results - page 589 / 661
» Affective e-Learning: Using
Sort
View
120
Voted
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
15 years 6 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
116
Voted
APGV
2004
ACM
124views Visualization» more  APGV 2004»
15 years 6 months ago
An experimental approach to predicting saliency for simplified polygonal models
In this paper, we consider the problem of determining feature saliency for 3D objects and describe a series of experiments that examined if salient features exist and can be predi...
Sarah Howlett, John Hamill, Carol O'Sullivan
139
Voted
CGO
2006
IEEE
15 years 6 months ago
Space-Efficient 64-bit Java Objects through Selective Typed Virtual Addressing
Memory performance is an important design issue for contemporary systems given the ever increasing memory gap. This paper proposes a space-efficient Java object model for reducing...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...
129
Voted
CCGRID
2001
IEEE
15 years 6 months ago
Group Communication in Differentiated Services Networks
The Differentiated Services (DiffServ) approach will also bring benefits for multicast applications which need quality of service support. For instance, a highly reliable multicas...
Roland Bless, Klaus Wehrle
107
Voted
RULES
1995
Springer
92views Database» more  RULES 1995»
15 years 6 months ago
Rule Contexts in Active Databases - A Mechanism for Dynamic Rule Grouping
Engineering applications that use Active DBMSs (ADBMSs) often need to group activities into modes that are shifted during the execution of different tasks. This paper presents a me...
Martin Sköld, Esa Falkenroth, Tore Risch