Sciweavers

2941 search results - page 537 / 589
» The Myth of the Educational Computer
Sort
View
ECRIME
2007
14 years 1 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ICANN
2007
Springer
14 years 28 days ago
Topology Aware Internet Traffic Forecasting Using Neural Networks
Forecasting Internet traffic is receiving an increasing attention from the computer networks domain. Indeed, by improving this task efficient traffic engineering and anomaly detect...
Paulo Cortez, Miguel Rio, Pedro Sousa, Miguel Roch...
ITS
2000
Springer
140views Multimedia» more  ITS 2000»
14 years 19 days ago
Multi-agent Negotiation to Support an Economy for Online Help and Tutoring
We are designing a computational architecture for a "learning economy" based on personal software agents who represent users in a virtual society and assist them in find...
Chhaya Mudgal, Julita Vassileva
VISSYM
2007
13 years 11 months ago
Viewpoint Selection for Intervention Planning
Viewpoint selection is crucial for medical intervention planning. The interactive exploration of a scene with 3d objects involves the systematic analysis of several anatomic struc...
Konrad Mühler, Mathias Neugebauer, Christian ...
DIMEA
2008
190views Multimedia» more  DIMEA 2008»
13 years 10 months ago
Bridging the gap between the digital and the physical: design and evaluation of a mobile augmented reality guide for the museum
Can Augmented Reality (AR) techniques inform the design and implementation of a mobile multimedia guide for the museum setting? Drawing from our experience both on previous mobile...
Areti Damala, Pierre Cubaud, Anne Bationo, Pascal ...