Sciweavers

1763 search results - page 240 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
SEMWEB
2005
Springer
15 years 9 months ago
An Application of Semantic Web Technologies to Situation Awareness
Situation awareness involves the identification and monitoring of relationships among objects participating in an evolving situation. This problem in general is intractable (i.e.,...
Christopher J. Matheus, Mieczyslaw M. Kokar, Kenne...
HUC
2004
Springer
15 years 9 months ago
Designing Capture Applications to Support the Education of Children with Autism
We explore the social and technical design issues involved in tracking the effectiveness of educational and therapeutic interventions for children with autism (CWA). Automated capt...
Gillian R. Hayes, Julie A. Kientz, Khai N. Truong,...
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 9 months ago
Adoption of Collaboration Information Technologies in Australian and US Organizations: A Comparative Study
Collaboration to accomplish tasks has taken on a new meaning over the past few years. The majority of organizations are viewing information technology (IT) as a key enabler to tra...
Deepinder S. Bajwa, L. Floyd Lewis, Graham Pervan
IFIP3
2003
135views Education» more  IFIP3 2003»
15 years 5 months ago
Pedagogical Models in Network-Based Education
One special challenge facing teachers, planners and researchers is the development of pedagogical models, teaching methods and teaching practices that are applicable in network-bas...
Sanna Vahtivuori-Hänninen
IJSN
2006
76views more  IJSN 2006»
15 years 4 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li