Sciweavers

1558 search results - page 117 / 312
» Effective Analysis and Design of Computer-Supported Learning...
Sort
View
133
Voted
RAID
2004
Springer
15 years 9 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
112
Voted
IJAOSE
2008
83views more  IJAOSE 2008»
15 years 3 months ago
PASSIM: a simulation-based process for the development of multi-agent systems
: This paper presents the Process for Agent Specification, Simulation and Implementation (PASSIM), a simulation-based development process for Multi-agent Systems (MASs), which was ...
Massimo Cossentino, Giancarlo Fortino, Alfredo Gar...
132
Voted
TCAD
2002
146views more  TCAD 2002»
15 years 3 months ago
Static scheduling of multidomain circuits for fast functional verification
With the advent of system-on-a-chip design, many application specific integrated circuits (ASICs) now require multiple design clocks that operate asynchronously to each other. This...
Murali Kudlugi, Russell Tessier
146
Voted
AIED
2009
Springer
15 years 10 months ago
Detecting the Learning Value of Items In a Randomized Problem Set
Researchers that make tutoring systems would like to know which pieces of educational content are most effective at promoting learning among their students. Randomized controlled e...
Zachary A. Pardos, Neil T. Heffernan
119
Voted
ISSS
1998
IEEE
120views Hardware» more  ISSS 1998»
15 years 8 months ago
Application of Instruction Analysis/Synthesis Tools to x86's Functional Unit Allocation
Designing a cost effective superscalar architecture for x86 compatible microprocessors is a challenging task in terms of both technical difficulty and commercial value. One of the...
Ing-Jer Huang, Ping-Huei Xie