Sciweavers

169 search results - page 27 / 34
» Generating Fixes from Object Behavior Anomalies
Sort
View
GAMEON
2009
14 years 7 months ago
Analysis of User Trajectories Based on Data Distribution and State Transition: a Case Study with a Massively Multiplayer Online
At present, trajectory data, series of coordinate data traversed by moving objects, can be readily obtained due to the advent of positioning technologies. Clustering of trajectori...
Ruck Thawonmas, Junichi Oda, Kuan-Ta Chen
TEI
2010
ACM
133views Hardware» more  TEI 2010»
15 years 4 months ago
Move it!: puppetry for creativity
This project studied the influence of kinesthetic intelligences on creativity in young children. To understand this relationship preschoolers were observed in their daycare setti...
Jasmine M. Williams
DSN
2006
IEEE
15 years 1 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
CANDC
2009
ACM
15 years 4 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
61
Voted
JSA
2006
82views more  JSA 2006»
14 years 9 months ago
A flocking based algorithm for document clustering analysis
ct 7 Social animals or insects in nature often exhibit a form of emergent collective behavior known as flocking. In this paper, 8 we present a novel Flocking based approach for doc...
Xiaohui Cui, Jinzhu Gao, Thomas E. Potok