Sciweavers

909 search results - page 164 / 182
» The Development of the AQ20 Learning System and Initial Expe...
Sort
View
CHI
1992
ACM
13 years 11 months ago
Portholes: Supporting Awareness in a Distributed Work Group
We are investigating ways in which media space technologies can support distributed work groups through access to information that supports general awareness. Awareness involves k...
Paul Dourish, Sara A. Bly
CAISE
2010
Springer
13 years 8 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CG
2007
Springer
13 years 7 months ago
Visualizing and animating the winged-edge data structure
The winged- and half- edge data structures are commonly used representations for polyhedron models. Due to the complexity, students in an introductory to computer graphics course ...
Bryan Neperud, John L. Lowther, Ching-Kuang Shene
SCAI
2008
13 years 9 months ago
Sharing Moral Responsibility with Robots: A Pragmatic Approach
Roboethics is a recently developed field of applied ethics which deals with the ethical aspects of technologies such as robots, ambient intelligence, direct neural interfaces and i...
Gordana Dodig-Crnkovic, Daniel Persson