Sciweavers

2594 search results - page 325 / 519
» Environment as Active Support of Interaction
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 9 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
ICSE
2012
IEEE-ACM
11 years 11 months ago
What make long term contributors: Willingness and opportunity in OSS community
—To survive and succeed, software projects need to attract and retain contributors. We model the individual’s chances to become a valuable contributor through her capacity, wil...
Minghui Zhou, Audris Mockus
VISUALIZATION
1992
IEEE
14 years 1 months ago
Display of Scientific Data Structures for Algorithm Visualization
algorithms as networks of modules. The data flow architecture is popular because of the flexibility of mixing calculation modules with display modules, and because of its easy grap...
William L. Hibbard, Charles R. Dyer, Brian E. Paul
AIED
2009
Springer
14 years 3 months ago
Looking Into Collaborative Learning: Design from Macro- and Micro-Script Perspectives
Design of collaborative learning (CL) scenarios is a complex task, but necessary if the goal of the collaboration is learning. Creating well-thought-out CL scenarios requires exper...
Eloy D. Villasclaras-Fernández, Seiji Isota...
JSW
2008
136views more  JSW 2008»
13 years 9 months ago
Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis
- In the Software Product Line approach, product configuration is a key activity in which stakeholders choose features for a product. This activity is critical in the sense that ca...
Marcílio Mendonça, Donald D. Cowan, ...