To support delay-sensitive applications on IP over wireless LAN (WLAN), both layer-2 handoff (L2H) and layer-3 handoff (L3H) must be conducted efficiently. Prior studies toward a fast L2H/L3H assume simple networking ...
详细信息
News articles have always been a prominent force in the formation of a company's financial image in the minds of the general public, especially the investors. Given the large amount of news being generated these d...
Nowadays, more and more applications are computing-intensive, such as search engines, online game servers, or even fMRI, used in medical examination. Supercomputers are setup to meet the computing demand as well as hu...
详细信息
The First International Workshop on Requirements engineering for Social Computing (RESC'11)1 was held in Trento on August 29, 2011, in conjunction with the 19th IEEE International Requirements engineering Conferen...
详细信息
The Manipuller is a novel Gestural Controller based on strings manipulation and multi-dimensional force sensing technology. This paper describes its motivation, design and operational principles along with some of its...
详细信息
Connectivity in vehicular ad hoc networks (VANETs) exhibits stronger challenges than that in other general ad hoc networks. In this paper inter vehicular connectivity is analyzed among different length of vehicles tha...
详细信息
Malware is an important topic of security threat research. In this paper, a behavioral malware analysis system TWMAN was presented. This study focuses on using real operation system (OS) environment to analysis malwar...
详细信息
Most teachers and students are convinced of the preparing lessons before class is important and effective to engage in classroom activities, but the unknown state of preparation usually discourages both teachers and s...
详细信息
ISBN:
(纸本)9786161201883
Most teachers and students are convinced of the preparing lessons before class is important and effective to engage in classroom activities, but the unknown state of preparation usually discourages both teachers and students to sustain this good learning strategy. From literature survey, JiTT and WIRE model provided effective warm-up strategies but also found some challenges in implementation. This work-in-progress research applied self-explanation theory and reading comprehension strategies to design a lesson warm-up mechanism. A correspondent supporting system was constructed to implement the mechanism to improve the effect of warm-up. This study is currently being experimented using quasi-experiment method for computerscience students. Both quantitative and qualitative data will be collected, analyzed, and shared in the future.
In order to reduce the energy dissipation in main memory of computer systems, phase change memory (PCM) has emerged as one of the most promising technologies to incorporate into the memory hierarchy. However, PCM has ...
详细信息
This paper presents a novel active-learning (AL) technique in the context of the cascade classification of multitemporal remote-sensing images for updating land-cover maps. The proposed AL technique is based on the se...
详细信息
暂无评论