Sciweavers

1454 search results - page 228 / 291
» Modeling User Affect from Causes and Effects
Sort
View
IJDET
2010
123views more  IJDET 2010»
14 years 7 months ago
An Adaptive Course Generation Framework
: Existing adaptive e-learning methods are supported by student (user) profiling for capturing student characteristics, and course structuring for organizing learning materials acc...
Frederick W. B. Li, Rynson W. H. Lau, Parthiban Dh...
INFOCOM
2012
IEEE
13 years 11 days ago
Truthful spectrum auction design for secondary networks
Abstract—Opportunistic wireless channel access by nonlicensed users has emerged as a promising solution for addressing the bandwidth scarcity challenge. Auctions represent a natu...
Yuefei Zhu, Baochun Li, Zongpeng Li
TVCG
2012
248views Hardware» more  TVCG 2012»
13 years 11 days ago
Scanning 3D Full Human Bodies Using Kinects
—Depth camera such as Microsoft Kinect, is much cheaper than conventional 3D scanning devices, and thus it can be acquired for everyday users easily. However, the depth data capt...
Jing Tong, Jin Zhou, Ligang Liu, Zhigeng Pan, Hao ...
AINA
2007
IEEE
15 years 4 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
RAID
1999
Springer
15 years 2 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf