Sciweavers

1663 search results - page 211 / 333
» Computer Security in the Real World
Sort
View
C5
2004
IEEE
15 years 8 months ago
Enabling Social Dimensions of Learning through a Persistent, Unified, Massively Multi-User, and Self-Organizing Virtual Environm
Existing online learning experiences lack the social dimension that characterizes learning in the real world. This social dimension extends beyond the traditional classroom into t...
Julian Lombardi, Mark P. McCahill
CVPR
2000
IEEE
15 years 7 months ago
Adaptive Metric nearest Neighbor Classification
Nearest neighbor classification assumes locally constant class conditional probabilities. This assumption becomes invalid in high dimensions with finite samples due to the curse o...
Carlotta Domeniconi, Dimitrios Gunopulos, Jing Pen...
GD
2000
Springer
15 years 7 months ago
User Preference of Graph Layout Aesthetics: A UML Study
The merit of automatic graph layout algorithms is typically judged on their computational efficiency and the extent to which they conform to aesthetic criteria (for example, minimi...
Helen C. Purchase, Jo-Anne Allder, David A. Carrin...
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 7 months ago
Tracking multiple objects in non-stationary video
One of the key problems in computer vision and pattern recognition is tracking. Multiple objects, occlusion, and tracking moving objects using a moving camera are some of the chal...
Hoang Nguyen, Bir Bhanu
CRITICAL
2005
15 years 6 months ago
Involving non-players in pervasive games
In traditional computer games, it is not uncommon for the game world to be inhabited by numerous computergenerated characters, Non-Player Characters (NPCs). In pervasive games, pl...
Jenny Niemi, Susanna Sawano, Annika Waern