Sciweavers

1089 search results - page 122 / 218
» Transparent user models for personalization
Sort
View
UM
2010
Springer
15 years 2 months ago
Inducing Effective Pedagogical Strategies Using Learning Context Features
Effective pedagogical strategies are important for e-learning environments. While it is assumed that an effective learning environment should craft and adapt its actions to the use...
Min Chi, Kurt VanLehn, Diane J. Litman, Pamela W. ...
SIGUCCS
2003
ACM
15 years 9 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
ISMAR
2002
IEEE
15 years 9 months ago
Practical Solutions for Calibration of Optical See-Through Devices
One of the most crucial tasks in a see-through augmented reality (AR) system is to register the virtual objects with the real world through a transparent display. The importance s...
Yakup Genc, Mihran Tuceryan, Nassir Navab
FGCS
2008
140views more  FGCS 2008»
15 years 4 months ago
Allocation strategies for utilization of space-shared resources in Bag of Tasks grids
As the adoption of grid computing in organizations expands, the need for wise utilization of different types of resources also increases. A volatile resource, such as a desktop co...
César A. F. De Rose, Tiago C. Ferreto, Rodr...
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos