Sciweavers

151 search results - page 23 / 31
» his 2009
Sort
View
IAT
2009
IEEE
15 years 1 months ago
Multi-a(ge)nt Graph Patrolling and Partitioning
We introduce a novel multi agent patrolling algorithm inspired by the behavior of gas filled balloons. Very low capability ant-like agents are considered with the task of patrolli...
Yotam Elor, Alfred M. Bruckstein
98
Voted
ACMSE
2009
ACM
14 years 7 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
EUSFLAT
2009
136views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Fuzzy Continuous Evaluation in Training Systems Based on Virtual Reality
The approach of continuous evaluation is an important tool in the learning process. However, only recently it was applied in training based on virtual reality. This paper presents ...
Ronei Moraes, Liliane Machado
HCI
2009
14 years 7 months ago
Optimal Affective Conditions for Subconscious Learning in a 3D Intelligent Tutoring System
In this paper we take a closer and in-depth look at initial results obtained from a previous novel experiment conducted with a 3D subliminal teaching Intelligent Tutoring System. S...
Pierre Chalfoun, Claude Frasson
IADIS
2009
14 years 7 months ago
Trash article detection using categorization techniques
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
Christos Bouras, Vassilis Tsogkas, Vassilis Poulop...