Sciweavers

10820 search results - page 1963 / 2164
» Understanding the
Sort
View
NIPS
2004
13 years 10 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
GAMEON
2003
13 years 10 months ago
A Web-Based Game for Supporting Game-Based Learning
Game-based learning has been recognized as an important alternative or supplement to traditional in-class, face-to-face teaching. It can help both adults and children in learning ...
Olga Dzianbenko, Maja Pivec, Christos Bouras, Vagg...
MODELLIERUNG
2001
13 years 10 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
NSDI
2004
13 years 10 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
SODA
2001
ACM
188views Algorithms» more  SODA 2001»
13 years 10 months ago
Approximation algorithms for the 0-extension problem
In the 0-extension problem, we are given a weighted graph with some nodes marked as terminals and a semimetric on the set of terminals. Our goal is to assign the rest of the nodes ...
Gruia Calinescu, Howard J. Karloff, Yuval Rabani
« Prev « First page 1963 / 2164 Last » Next »