Sciweavers

3555 search results - page 653 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
AH
2008
Springer
15 years 7 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson
IUI
2004
ACM
15 years 6 months ago
Qualitative physics in virtual environments
In this paper, we describe a new approach to the creation of virtual environments, which uses qualitative physics to implement object behaviour. We adopted Qualitative Process The...
Marc Cavazza, Simon Hartley, Jean-Luc Lugrin, Mika...
ATAL
2003
Springer
15 years 6 months ago
Risk-averse auction agents
Auctions are an important means for purchasing material in the era of e-commerce. Research on auctions often studies them in isolation. In practice, however, auction agents are pa...
Yaxin Liu, Richard Goodwin, Sven Koenig
LCTRTS
2000
Springer
15 years 5 months ago
An Integrated Push/Pull Buffer Management Method in Multimedia Communication Environments
Multimedia communication systems require not only high-performance computer hardware and highspeed networks, but also a buffer management mechanism to process voluminous data effi...
Sungyoung Lee, Hyonwoo Seung, Taewoong Jeon
JUCS
2010
186views more  JUCS 2010»
14 years 11 months ago
Context Awareness for Collaborative Learning with Uncertainty Management
: In Collaborative Learning, groups of students work together using traditional and computer-based tools or applications. Participants are continuously moving and reorganizing in g...
Roc Messeguer, Leandro Navarro, Pedro Damiá...