Sciweavers

606 search results - page 103 / 122
» A comparative study of architecture knowledge management too...
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
SIGIR
1999
ACM
15 years 1 months ago
SCAN: Designing and Evaluating User Interfaces to Support Retrieval From Speech Archives
Previous examinations of search in textual archives have assumed that users first retrieve a ranked set of documents relevant to their query, and then visually scan through these ...
Steve Whittaker, Julia Hirschberg, John Choi, Dona...
72
Voted
ENVSOFT
2006
84views more  ENVSOFT 2006»
14 years 9 months ago
Modeling the fate of down-the-drain chemicals in rivers: An improved software for GREAT-ER
GREAT-ER (Geography-referenced Regional Exposure Assessment Tool for European Rivers) is a model system for predicting chemical fate and exposure in surface waters. The GREAT-ER a...
F. Koormann, J. Rominger, D. Schowanek, J.-O. Wagn...
SIGUCCS
2003
ACM
15 years 2 months ago
Teaching with technology, setting an example
Providing instructional technology support for faculty requires a range of skills, from knowledge of software and hardware, to an ability to communicate, teach workshops, and rela...
Trevor Murphy, Mika Hirai
108
Voted
SIGUCCS
2006
ACM
15 years 3 months ago
Better results in mathematics lessons with a virtual personal teacher
In this paper we present the results of an experiment made with our e-librarian service ”MatES”, an e-Learning tool on fractions in mathematics. MatES allows students to enter...
Serge Linckels, Carole Dording, Christoph Meinel