Sciweavers

1502 search results - page 165 / 301
» The new face of war
Sort
View
CHI
2010
ACM
14 years 5 months ago
Postcolonial computing: a lens on design and development
As our technologies travel to new cultural contexts and our designs and methods engage new constituencies, both our design and analytical practices face significant challenges. We...
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita P...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 5 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
IAT
2009
IEEE
14 years 5 months ago
Distributed Constraint Optimization for Large Teams of Mobile Sensing Agents
Abstract. A team of mobile sensors can be used for coverage of targets in different environments. The dynamic nature of such an application requires the team of agents to adjust th...
Roie Zivan, Robin Glinton, Katia P. Sycara
ICPP
2009
IEEE
14 years 5 months ago
Investigating High Performance RMA Interfaces for the MPI-3 Standard
—The MPI-2 Standard, released in 1997, defined an interface for one-sided communication, also known as remote memory access (RMA). It was designed with the goal that it should p...
Vinod Tipparaju, William Gropp, Hubert Ritzdorf, R...
DIGITEL
2008
IEEE
14 years 4 months ago
Development of Educational Videogames in m-Learning Contexts
The educational gaming field is rapidly growing both in acceptance and variety. Within this variety, the technological evolution of wireless/handheld (W/H) computing devices is op...
Pablo Lavín-Mera, Pablo Moreno-Ger, Baltasa...