Sciweavers

1317 search results - page 115 / 264
» context 2005
Sort
View
SIGCSE
2005
ACM
122views Education» more  SIGCSE 2005»
14 years 2 months ago
Design process for a non-majors computing course
There is growing interest in computing courses for non-CS majors. We have recently built such a course that has met with positive response. We describe our design process, which i...
Mark Guzdial, Andrea Forte
WOSP
2005
ACM
14 years 2 months ago
From StoCharts to MoDeST: a comparative reliability analysis of train radio communications
StoCharts have been proposed as a UML statechart extension for performance and dependability evaluation, and have been applied in the context of train radio reliability assessment...
Holger Hermanns, David N. Jansen, Yaroslav S. Usen...
ACII
2005
Springer
14 years 2 months ago
Affective Composites: Autonomy and Proxy in Pedagogical Agent Networks
This paper proposes an alternative paradigm for building affective competencies in embodied conversational agents (ECAs). The key feature of this approach -- and the reason for ref...
Eric R. Hamilton
ACNS
2005
Springer
81views Cryptology» more  ACNS 2005»
14 years 2 months ago
Searching for High-Value Rare Events with Uncheatable Grid Computing
Abstract. High-value rare-event searching is arguably the most natural application of grid computing, where computational tasks are distributed to a large collection of clients (wh...
Wenliang Du, Michael T. Goodrich
ADHOCNOW
2005
Springer
14 years 2 months ago
Cache Placement in Sensor Networks Under Update Cost Constraint
— In this paper, we address an optimization problem that arises in context of cache placement in sensor networks. In particular, we consider the cache placement problem where the...
Bin Tang, Samir R. Das, Himanshu Gupta