Sciweavers

51 search results - page 7 / 11
» Strategies Employed By Participants In Virtual Learning Comm...
Sort
View
74
Voted
SOUPS
2009
ACM
15 years 6 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
COMSUR
2008
108views more  COMSUR 2008»
15 years 13 days ago
A survey of techniques for internet traffic classification using machine learning
The research community has begun looking for IP traffic classification techniques that do not rely on `well known' TCP or UDP port numbers, or interpreting the contents of pac...
Thuy T. T. Nguyen, Grenville J. Armitage
AIIDE
2008
15 years 2 months ago
Intelligent Trading Agents for Massively Multi-player Game Economies
As massively multi-player gaming environments become more detailed, developing agents to populate these virtual worlds as capable non-player characters poses an increasingly compl...
John Reeder, Gita Sukthankar, Michael Georgiopoulo...
118
Voted
EICS
2009
ACM
15 years 6 months ago
Input evaluation of an eye-gaze-guided interface: Kalman filter vs. velocity threshold eye movement identification
This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman Filter (I-KF) eye movement detection models when employed for eye-gaze-guided inter...
Do Hyong Koh, Sandeep A. Munikrishne Gowda, Oleg V...
CSCW
2006
ACM
15 years 6 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson