Sciweavers

42738 search results - page 8253 / 8548
» Search Computing Systems
Sort
View
CHI
2010
ACM
15 years 10 months ago
Let's play chinese characters: mobile learning approaches via culturally inspired group games
In many developing countries such as India and China, low educational levels often hinder economic empowerment. In this paper, we argue that mobile learning games can play an impo...
Feng Tian, Fei Lv, Jingtao Wang, Hongan Wang, Wenc...
119
Voted
SAC
2010
ACM
15 years 10 months ago
A robust link-translating proxy server mirroring the whole web
Link-translating proxies are widely used for anonymous browsing, policy circumvention and WebVPN functions. These are implemented by encoding the destination URL in the path of th...
Ziqing Mao, Cormac Herley
142
Voted
SAC
2010
ACM
15 years 10 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
EVOW
2010
Springer
15 years 10 months ago
Grammatical Evolution Decision Trees for Detecting Gene-Gene Interactions
DEODHAR, SUSHAMNA DEODHAR. Using Grammatical Evolution Decision Trees for Detecting Gene-Gene Interactions in Genetic Epidemiology. (Under the direction of Dr. Alison Motsinger-Re...
Sushamna Deodhar, Alison A. Motsinger-Reif
ICCSA
2010
Springer
15 years 10 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
« Prev « First page 8253 / 8548 Last » Next »