Sciweavers

693 search results - page 109 / 139
» Post-training support for learning technology
Sort
View
111
Voted
ITNG
2007
IEEE
15 years 8 months ago
Software Reuse: Research and Practice
— It has been almost four decades since the idea of software reuse was proposed. Many success stories have been told, yet it is believed that software reuse is still in the devel...
Sajjan G. Shiva, Lubna Abou Shala
115
Voted
IV
2007
IEEE
144views Visualization» more  IV 2007»
15 years 8 months ago
Evaluating an InfoVis Technique Using Insight Reports
The evaluation of Information Visualization (InfoVis) techniques can help to identify specific strengths and weaknesses of these methods. The following article describes the resu...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...
ATAL
2007
Springer
15 years 8 months ago
F-trade: an agent-mining symbiont for financial services
The interaction and integration of agent technology and data mining presents prominent benefits to solve some of challenging issues in individual areas. For instance, data mining ...
Longbing Cao, Chengqi Zhang
120
Voted
ISW
2007
Springer
15 years 8 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
LCN
2006
IEEE
15 years 8 months ago
ROADNet: A network of SensorNets
As sensor networks become denser and more widely deployed, the potential develops for interconnecting these networks to combine datasets, share technological solutions, and to con...
Todd Hansen, Sameer Tilak, Steve Foley, Kent Lindq...