Sciweavers

5758 search results - page 1144 / 1152
» Anonymity-preserving data collection
Sort
View
HICSS
2003
IEEE
215views Biometrics» more  HICSS 2003»
14 years 23 days ago
A Field Study of Use of Synchronous Chat in Online Courses
A field study of Computer Mediated Communication (CMC) as used in higher education asks the questions, "Will students take part in synchronous chat sessions if they are sched...
David H. Spencer, Starr Roxanne Hiltz
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 23 days ago
Lessons Learned from Real DSL Experiments
Over the years, our group, led by Bob Balzer, designed and implemented three domain-specific languages for use by outside people in real situations. The first language described t...
David S. Wile
ICNP
2003
IEEE
14 years 23 days ago
The Temporal and Topological Characteristics of BGP Path Changes
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates ...
Di-Fa Chang, Ramesh Govindan, John S. Heidemann
ICNP
2003
IEEE
14 years 23 days ago
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Networks
Abstract—In the paper, we devise and evaluate a fully decentralized, light-weight, dynamic clustering algorithm for target tracking. Instead of assuming the same role for all the...
Wei-Peng Chen, Jennifer C. Hou, Lui Sha
IRI
2003
IEEE
14 years 23 days ago
Damage Pattern Mining in Hurricane Image Databases
– We present a damage pattern mining framework for hurricane data on residential houses using aerial photographs with 1:3000 based scale. The vertical photographs are normally co...
Shu-Ching Chen, Mei-Ling Shyu, Chengcui Zhang, Wal...
« Prev « First page 1144 / 1152 Last » Next »