An important threat to reliable storage of data is silent data corruption. In order to develop suitable protection mechanisms against data corruption, it is essential to understan...
Lakshmi N. Bairavasundaram, Garth R. Goodson, Bian...
The main purpose behind the design of this experience is the idea of obtaining useful information to know how the online courses in our University have been developed, and trying t...
This paper presents a census of 147 virtual agents, by examining and reporting on their physical and demographical characteristics. The study shows that the vast majority of agent...
An understanding of how people in social networks consume news media by and about their friends shows that information overload is soon going to be a major problem for many partic...
Developing a robot system that can interact directly with a human instructor in a natural way requires not only highly-skilled sensorimotor coordination and action planning on the ...
Markus Rickert, Mary Ellen Foster, Manuel Giuliani...