Sciweavers

7984 search results - page 1370 / 1597
» Exploring personal information
Sort
View
IIE
2006
83views more  IIE 2006»
15 years 3 months ago
Is ICT a Lever for Educational Change? A Study of the Impact of ICT Implementation on Teaching and Learning in Hong Kong
Abstract. The ongoing, unprecedented growth of ICT, coupled with the globalisation of the economy, has created a huge challenge for education. This rapid growth of infusing ICT in ...
Emily M. L. Wong, Sandy C. Li
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 3 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 3 months ago
The source coding game with a cheating switcher
Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) compos...
Hari Palaiyanur, Cheng Chang, Anant Sahai
IJSYSC
2006
86views more  IJSYSC 2006»
15 years 3 months ago
Cooperative forest fire surveillance using a team of small unmanned air vehicles
The objective of this paper is to explore the feasibility of using multiple low-altitude, short endurance (LASE) unmanned air vehicles (UAVs) to cooperatively monitor and track th...
David W. Casbeer, Derek B. Kingston, Randal W. Bea...
134
Voted
JCIT
2008
165views more  JCIT 2008»
15 years 3 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
« Prev « First page 1370 / 1597 Last » Next »