Sciweavers

1456 search results - page 224 / 292
» Keeping encountered information
Sort
View
SIGCSE
2008
ACM
160views Education» more  SIGCSE 2008»
14 years 11 months ago
CS 0.5: a better approach to introductory computer science for majors
There are often problems when students enter a course with widely different experience levels with key course topics. If the material is covered too slowly, those with greater exp...
Robert H. Sloan, Patrick Troy
SIGKDD
2008
149views more  SIGKDD 2008»
14 years 11 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
TCSV
2008
94views more  TCSV 2008»
14 years 11 months ago
FGS Coding Using Cycle-Based Leaky Prediction Through Multiple Leaky Factors
This paper proposes a fine granularity scalable (FGS) coding using cycle-based leaky prediction, in which the multiple leaky factors are used to yield enhancement layer prediction ...
Xiangyang Ji, Yanyan Zheng, Debin Zhao, Feng Wu, W...
IWC
2007
100views more  IWC 2007»
14 years 11 months ago
Usefulness of VRML building models in a direction finding context
This paper describes an experiment which aims to examine the effectiveness and efficiency of a Virtual Reality Modelling Language (VRML) building model compared with equivalent ar...
Pietro Murano, Dino Mackey
ENTCS
2002
107views more  ENTCS 2002»
14 years 11 months ago
Monitoring, Checking, and Steering of Real-Time Systems
The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring...
Moonjoo Kim, Insup Lee, Usa Sammapun, Jangwoo Shin...