Sciweavers

1663 search results - page 208 / 333
» Computer Security in the Real World
Sort
View
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
15 years 10 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
123
Voted
ICNS
2006
IEEE
15 years 10 months ago
Pervasive Service Platform (PSP): Facilitating Pervasive Services
— Pervasive computing is a new and emerging technology. The concept of pervasiveness and its deployment into reality are still not well aligned. This is because the vision of per...
Fiona Mahon, Jelena Mitic, Micheal Crotty, Kevin D...
149
Voted
OZCHI
2006
ACM
15 years 10 months ago
Spatial sound localization in an augmented reality environment
Augmented Reality (AR), the overlay of virtual images onto the real world, is an increasingly popular technique for developing new human-computer interfaces. As human navigation a...
Jaka Sodnik, Saso Tomazic, Raphael Grasset, Andrea...
ITICSE
2005
ACM
15 years 9 months ago
A research-led curriculum in multimedia: learning about convergence
Traditional teaching methods have acknowledged limitations. Lectures may be used to transmit information efficiently, but often fail to motivate students to engage with the subjec...
Hugh C. Davis, Su White
BERTINORO
2005
Springer
15 years 9 months ago
Self-Aware Software - Will It Become a Reality?
The possibility of building self-aware software fascinated computer scientist since the beginning of computer science. Research in AI, and in particular on software agents, agent s...
Péter András, Bruce G Charlton