Sciweavers

2687 search results - page 393 / 538
» Group communication support for distributed collaboration sy...
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
UM
2001
Springer
14 years 1 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
CDC
2008
IEEE
14 years 3 months ago
Passivity-based output synchronization and flocking algorithm in SE(3)
Abstract— This paper addresses passivity-based output synchronization and a collision avoidance problem of rigid bodies in the Special Euclidean group SE(3) under the assumption ...
Yuji Igarashi, Takeshi Hatanaka, Masayuki Fujita, ...
CIC
2003
140views Communications» more  CIC 2003»
13 years 10 months ago
Magic Square: Scalable Peer-to-Peer Lookup Protocol Considering Peer's Characteristics
One of the research problems in P2P computing is to look up and store the resource efficiently. The recent algorithms developed by several research groups for the lookup problem p...
Sun-Mi Park, Il-dong Jung, Dong-joo Song, Young-su...
IJEB
2007
127views more  IJEB 2007»
13 years 9 months ago
Factors mediating the routinisation of e-learning within a traditional university education environment
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) ...
Shafqat Hameed, John Mellor, Atta Badii, Niyati Pa...