Sciweavers

223 search results - page 27 / 45
» pc 2006
Sort
View
CSREASAM
2006
13 years 9 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
IJAR
2007
130views more  IJAR 2007»
13 years 7 months ago
Bayesian network learning algorithms using structural restrictions
The use of several types of structural restrictions within algorithms for learning Bayesian networks is considered. These restrictions may codify expert knowledge in a given domai...
Luis M. de Campos, Javier Gomez Castellano
SIGCSE
2006
ACM
150views Education» more  SIGCSE 2006»
14 years 1 months ago
Pedagogical techniques supported by the use of student devices in teaching software engineering
This paper describes our experiences in promoting a learning environment where active student involvement and interaction, as well as openness to diversity of ideas are supported ...
Valentin Razmov, Richard J. Anderson
AAAI
2006
13 years 9 months ago
ScriptEase - Motivational Behaviors for Interactive Characters in Computer Role-Playing Games
ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, ...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
EGITALY
2006
13 years 9 months ago
Real-time Cataract Surgery Simulation for Training
Cataract is a clouding of the eye's natural lens, normally due to natural aging changes, and involving at least half of the population over 65 years. Cataract extraction is t...
Marco Agus, Enrico Gobbetti, Giovanni Pintore, Gia...