Sciweavers

876 search results - page 97 / 176
» Understanding Educator Perceptions of
Sort
View
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 9 months ago
The Application of Cloud Computing to the Creation of Image Mosaics and Management of Their Provenance
We have used the Montage image mosaic engine to investigate the cost and performance of processing images on the Amazon EC2 cloud, and to inform the requirements that higher-level...
G. Bruce Berriman, Ewa Deelman, Paul T. Groth, Gid...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 9 months ago
Towards Performance Measurement And Metrics Based Analysis of PLA Applications
This article is about a measurement analysis based approach to help software practitioners in managing the additional level complexities and variabilities in software product line...
Zeeshan Ahmed
CORR
2008
Springer
152views Education» more  CORR 2008»
13 years 9 months ago
It's Not What You Have, But How You Use It: Compromises in Mobile Device Use
As users begin to use many more devices for personal information management (PIM) than just the traditional desktop computer, it is essential for HCI researchers to understand how...
Manas Tungare, Manuel A. Pérez-Quiño...
CORR
2008
Springer
70views Education» more  CORR 2008»
13 years 9 months ago
Random Vandermonde Matrices-Part II: Applications
In this paper, we review some potential applications of random Vandermonde matrices in the field of signal processing and wireless communications. Using asymptotic results based on...
Øyvind Ryan, Mérouane Debbah
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 9 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith