Sciweavers

3451 search results - page 444 / 691
» Collaborative attack modeling
Sort
View
109
Voted
ACMIDC
2010
15 years 6 months ago
BeeSim: leveraging wearable computers in participatory simulations with young children
New technologies have enabled students to become active participants in computational simulations of dynamic and complex systems (called Participatory Simulations), providing a &q...
Kylie A. Peppler, Joshua A. Danish, Benjamin Zaitl...
ATAL
2006
Springer
15 years 6 months ago
Study of social consciousness in stochastic agent based simulations: application to supply chains
Empirical game theory allows studying the strategic interactions of agents in simulations. Specifically, traditional game theory describes such interactions by an analytical model...
Thierry Moyaux, Brahim Chaib-draa, Sophie D'Amours
120
Voted
UIST
1995
ACM
15 years 6 months ago
Migratory Applications
We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user interface and application contexts with them, and continue ...
Krishna Bharat, Luca Cardelli
115
Voted
DOCENG
2008
ACM
15 years 4 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
103
Voted
IADIS
2004
15 years 4 months ago
Problem-Based Learning Method Simulation by PBL Virtual Environment
Problem Based Learning (PBL) is a new teaching-learning method originated from the changes that have occurred in the world economical basis and in the information and communicatio...
Hernane Borges de Barros Pereira, Gabriela Ribeiro...