Sciweavers

4233 search results - page 770 / 847
» Three Paths to Effectiveness
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
INFOCOM
2009
IEEE
15 years 10 months ago
Distilling Superior Peers in Large-Scale P2P Streaming Systems
Abstract—In large-scale peer-to-peer (P2P) live streaming systems with a limited supply of server bandwidth, increasing the amount of upload bandwidth supplied by peers becomes c...
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao
AIED
2009
Springer
15 years 10 months ago
Detecting the Learning Value of Items In a Randomized Problem Set
Researchers that make tutoring systems would like to know which pieces of educational content are most effective at promoting learning among their students. Randomized controlled e...
Zachary A. Pardos, Neil T. Heffernan
128
Voted
CIKM
2009
Springer
15 years 10 months ago
MagicCube: choosing the best snippet for each aspect of an entity
Wikis are currently used in business to provide knowledge management systems, especially for individual organizations. However, building wikis manually is a laborious and time-con...
Yexin Wang, Li Zhao, Yan Zhang
ACMACE
2009
ACM
15 years 10 months ago
The impact of virtual teamwork on real-world collaboration
With the rapid advance of online gaming and virtual reality technology, virtual teamwork has become increasingly popular. People spend more and more time working with others in 3D...
Lin Qiu, Wendy Weini Tay, Junwei Wu