Sciweavers

4190 search results - page 608 / 838
» Implementing commitment-based interactions
Sort
View
120
Voted
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
15 years 9 months ago
Tools for Building Intelligent Tutoring Systems
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generatorsâ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
161
Voted
HICSS
2006
IEEE
179views Biometrics» more  HICSS 2006»
15 years 9 months ago
e-Government Integration with Web Services and Alerts: A Case Study on an Emergency Route Advisory System in Hong Kong
Quick and efficient response to emergency is important for every city. This depends on the quality of the dispatch of emergency service to the scene and back to hospital or other ...
Cherrie W. W. Ng, Dickson K. W. Chiu
122
Voted
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 9 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
HPCS
2006
IEEE
15 years 9 months ago
Collaborative Agents for Data Dissemination in Wireless Sensor Networks
This paper presents collaborative agents system architecture approach for data dissemination in a wireless sensor network (WSN). This system architecture consists of four layers o...
Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin...
ICAT
2006
IEEE
15 years 9 months ago
Manipulation of Field of View for Hand-Held Virtual Reality
Today, hand-held computing and media devices are commonly used in our everyday lives. This paper assesses the viability of hand-held devices as effective platforms for “virtual r...
Jane Hwang, Jaehoon Jung, Gerard Jounghyun Kim