Sciweavers

661 search results - page 72 / 133
» Online Mechanisms
Sort
View
CISIS
2008
IEEE
14 years 5 months ago
Integrating Shadows in Model Driven Engineering for Agile Software Development
Shadows are well known as a programming language feature in the application area of MUDs (a certain type of multi-player online game). We argue that agile methodologies can be enh...
Marc Conrad, Marianne Huchard, Thomas Preuss
ICALT
2008
IEEE
14 years 5 months ago
Personalized Access and Students' Coauthoring in Repositories of Learning Objects: The Case of a Repository of Programming Examp
This paper presents a Case-Based Reasoning approach for the personalized access and the students’ coauthoring tasks in on-line repositories of Learning Objects (LOs). The person...
Mercedes Gómez-Albarrán, Susana Baut...
SAINT
2008
IEEE
14 years 5 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
IAT
2007
IEEE
14 years 5 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
IROS
2007
IEEE
98views Robotics» more  IROS 2007»
14 years 5 months ago
Discrete trajectory control algorithms for NIMS3D, an autonomous underconstrained three-dimensional cabled robot
— In this paper we present algorithms that enable precise trajectory control of NIMS3D, an underconstrained, three-dimensional cabled robot intended for use in actuated sensing. ...
Per Henrik Borgstrom, Nils Peter Borgstrom, Michae...