|
|
|
|
Sheng, Xinxin
North Carolina State Univeristy
Cary, North Carolina
|
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 4 of 4
reviews
|
|
|
|
|
|
|
|
Game-based education for disaster prevention Tsai M., Wen M., Chang Y., Kang S. AI & Society 30(4): 463-475, 2015. Type: Article
The authors present a serious game designed for educational purposes, especially educating decision makers to handle flooding-related problems. Compared to traditional education methodology, game-based education is generally considered...
|
Feb 16 2016 |
|
|
|
|
|
|
Efficient RNTS system for privacy of banking off-line customer Jeong C., Ahn K. The Journal of Supercomputing 55(2): 307-319, 2011. Type: Article
In this paper, Jeong and Ahn discuss a possible security threat in a radio frequency identification (RFID) system, in which the tag operations, initiated by the system readers, are exposed to malicious eavesdropping, traffic analysis, ...
|
Sep 29 2011 |
|
|
|
|
|
|
Tags vs. shelves: from social tagging to social classification Zubiaga A., Körner C., Strohmaier M. HT 2011 (Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia, Eindhoven, the Netherlands, Jun 6-9, 2011) 93-102, 2011. Type: Proceedings
In this paper, the authors analyze how tags utilized by users with different motivations influence social classification effectiveness. With a very detailed description of the social library book tagging systems example, the authors po...
|
Aug 17 2011 |
|
|
|
|
|
|
ImageAlert: credibility analysis of text-image pairs on the Web Yamamoto Y., Tanaka K. SAC 2011 (Proceedings of the 2011 ACM Symposium on Applied Computing, TaiChung, Taiwan, Mar 21-24, 2011) 1724-1731, 2011. Type: Proceedings
In this paper, the authors propose a bipartite graph model to analyze the credibility of Web image-text pairs. The algorithm is a direct attack on the Web credibility concerns that researchers have been trying to untangle for years. Us...
|
Jul 19 2011 |
|
|
|
|
|
|
|
|
|
|
|