Sciweavers

8468 search results - page 1518 / 1694
» The Technology of Data Stashing
Sort
View
AH
2008
Springer
15 years 4 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson
AH
2008
Springer
15 years 4 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
85
Voted
ICNSC
2007
IEEE
15 years 4 months ago
Towards Robot-Assisted Mass-Casualty Triage
Abstract— This paper provides a discussion on how teleoperated robots could be utilized to do the simple triage of victims of a multiple casualty incident. Previous work in the a...
Carolina Chang, Robin R. Murphy
IRI
2007
IEEE
15 years 4 months ago
The Software Reuse Working Group: A Case Study in Fostering Reuse
Packaging software assets for reuse can improve the potential for others to adopt the software. Packaging the software with appropriate documentation and other resources can facil...
Ryan Gerard, Robert R. Downs, James J. Marshall, R...
ISCAS
2007
IEEE
180views Hardware» more  ISCAS 2007»
15 years 4 months ago
Characterization of a Fault-tolerant NoC Router
— With increasing reliability concerns for current and next generation VLSI technologies, fault-tolerance is fast becoming an integral part of system-on-chip (SoC) and multicore ...
Sumit D. Mediratta, Jeffrey T. Draper
« Prev « First page 1518 / 1694 Last » Next »