Sciweavers

16160 search results - page 121 / 3232
» How to approach humans
Sort
View
IJBIDM
2008
114views more  IJBIDM 2008»
13 years 8 months ago
Traffic mining in a road-network: How does the traffic flow?
: The flow of data coming from modern sensing devices enables the development of novel research techniques related to data management and knowledge extraction. In this work, we und...
Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos
IJISEC
2006
108views more  IJISEC 2006»
13 years 8 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
IJLT
2006
89views more  IJLT 2006»
13 years 8 months ago
How do you know they are learning? The importance of alignment in higher education
: The success of any learning environment is determined by the degree to which there is adequate alignment among eight critical factors: 1) goals, 2) content, 3) instructional desi...
Thomas C. Reeves
JCP
2006
85views more  JCP 2006»
13 years 8 months ago
How To Generate Distributed Software Components From Centralized Ones?
Adapting software components to be used in a particular application is a crucial issue in software component based technology. In fact, software components can be used in contexts ...
Abdelhak Seriai, Gautier Bastide, Mourad Oussalah
USAB
2010
13 years 6 months ago
"Same Same but Different" How Service Contexts of Mobile Technologies Shape Usage Motives and Barriers
As wireless technologies evolve, mobile technologies and services will increasingly affect our lives, accompanied by positive and negative effects. This development requires a high...
Katrin Arning, Sylvia Gaul, Martina Ziefle