Sciweavers

6412 search results - page 1234 / 1283
» Human Active Learning
Sort
View
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
INFOCOM
2010
IEEE
13 years 7 months ago
A Systematic Approach for Evolving VLAN Designs
—Enterprise networks are large and complex, and their designs must be frequently altered to adapt to changing organizational needs. The process of redesigning and reconfiguring ...
Xin Sun, Yu-Wei Eric Sung, Sunil Krothapalli, Sanj...
JCST
2010
119views more  JCST 2010»
13 years 7 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JOCN
2010
96views more  JOCN 2010»
13 years 7 months ago
Approaching the Bad and Avoiding the Good: Lateral Prefrontal Cortical Asymmetry Distinguishes between Action and Valence
■ Goal pursuit in humans sometimes involves approaching unpleasant and avoiding pleasant stimuli, such as when a dieter chooses to eat vegetables (although he does not like them...
Elliot T. Berkman, Matthew D. Lieberman
JOCN
2010
98views more  JOCN 2010»
13 years 7 months ago
Visual Anticipatory Information Modulates Multisensory Interactions of Artificial Audiovisual Stimuli
■ The neural activity of speech sound processing (the N1 component of the auditory ERP) can be suppressed if a speech sound is accompanied by concordant lip movements. Here we d...
Jean Vroomen, Jeroen J. Stekelenburg
« Prev « First page 1234 / 1283 Last » Next »