Sciweavers

790 search results - page 42 / 158
» Second life and education
Sort
View
CORR
2006
Springer
78views Education» more  CORR 2006»
13 years 7 months ago
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
FLAIM (Framework for Log Anonymization and Information Management) addresses two important needs not well addressed by current log anonymizers. First, it is extremely modular and ...
Adam J. Slagell, Kiran Lakkaraju, Katherine Luo
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 7 months ago
Using Users' Expectations to Adapt Business Intelligence Systems
: This paper takes a look at the general characteristics of business or economic intelligence system. The role of the user within this type of system is emphasized. We propose two ...
Babajide Afolabi, Odile Thiery
SIGCSE
2008
ACM
108views Education» more  SIGCSE 2008»
13 years 7 months ago
From sockets and RMI to web services
Traditional coverage of network programming techniques in a computer networking course addresses sockets, remote procedure call, and object-oriented remote procedure call. We prop...
Mark A. Holliday, J. Traynham Houston, E. Matthew ...
CORR
2002
Springer
126views Education» more  CORR 2002»
13 years 7 months ago
Unsupervised Discovery of Morphemes
We present two methods for unsupervised segmentation of words into morphemelike units. The model utilized is especially suited for languages with a rich morphology, such as Finnis...
Mathias Creutz, Krista Lagus
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 5 months ago
1D Effectively Closed Subshifts and 2D Tilings
Michael Hochman showed that every 1D effectively closed subshift can be simulated by a 3D subshift of finite type and asked whether the same can be done in 2D. It turned out that t...
Bruno Durand, Alexander Shen, Andrei E. Romashchen...