Sciweavers

4911 search results - page 792 / 983
» Personal Learning Environments
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 10 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
SIGCSE
2008
ACM
123views Education» more  SIGCSE 2008»
14 years 10 months ago
Cross-cultural issues in a tutored video instruction course
In this paper we discuss cultural issues encountered while offering an Algorithms course from a US university at a Chinese university using Tutored Video Instruction (TVI). TVI is...
Natalie Linnell, Richard J. Anderson, Jane Prey
ASC
2004
14 years 10 months ago
Soft computing applications in dynamic model identification of polymer extrusion process
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique i...
Leong Ping Tan, Ahmad Lotfi, Eugene Lai, J. B. Hul...
AROBOTS
1998
100views more  AROBOTS 1998»
14 years 10 months ago
Interleaving Planning and Robot Execution for Asynchronous User Requests
Rogue is an architecture built on a real robot which provides algorithms for the integration of highlevel planning, low-level robotic execution, and learning. Rogue addresses succ...
Karen Zita Haigh, Manuela M. Veloso
TC
2002
14 years 10 months ago
Dynamic Power Management for Nonstationary Service Requests
Dynamic Power Management (DPM) is a design methodology aiming at reducing power consumption of electronic systems by performing selective shutdown of idle system resources. The eff...
Eui-Young Chung, Luca Benini, Alessandro Bogliolo,...