Virtual World Computing

Results: 929



#Item
401Software / Internet ethics / Internet privacy / Twitter / Facebook / Knitting / Privacy / World Wide Web / Social media / Computing

big knitter terms and conditions the important and slightly less exciting bit Here are the full terms and conditions for the Big Knitter (our virtual Big Knit hat maker). If you’re creating a virtual hat you ought to r

Add to Reading List

Source URL: www.thebigknit.co.uk

Language: English - Date: 2014-09-17 09:46:06
402Digital media / Virtual world / Firewall / Second Life / Active Worlds / Software / Virtual reality / Computing / Virtual communities

Institutional support for and barriers to the use of 3D immersive virtual worlds in higher education Barney Dalgarno, Mark J.W. Lee, Lauren Carlson Charles Sturt University Sue Gregory University of New England

Add to Reading List

Source URL: eprints.usq.edu.au

Language: English - Date: 2013-07-02 21:09:15
403Virtual globes / 3D graphics software / Free software / Google Earth / Remote sensing / SketchUp / NASA World Wind / Google Toolbar / Sublayer / Software / Computing / Keyhole Markup Language

Index accuracy of data sources effecting views in layers, 79 active topics page in Keyhole forums, 119 Add Image Overlay button, 52 Add Path button, 51

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 14:12:28
404Software / Virtual communities / Second Life / Distance education / Virtual world / MUVE / OpenSimulator / E-learning / Active Worlds / Virtual reality / Internet culture / Computing

What about the firewall? Creating virtual worlds in a public primary school using Sim-on-a-Stick. Lisa Jacka & Kate Booth WHAT ABOUT THE FIREWALL? CREATING VIRTUAL WORLDS IN A PUBLIC PRIMARY SCHOOL USING SIM-ON-A-STICK.

Add to Reading List

Source URL: simonastick.com

Language: English - Date: 2012-10-18 13:48:56
405Human–computer interaction / Virtual world / Transformed social interaction / Avatar / Virtual body / Second Life / There / Situated / Virtual Human Interaction Lab / Virtual reality / Computing / Reality

The Tyranny of Embodiment (in Artifact, Vol. 2, 2009, 1-6) Nick Yee, Palo Alto Research Center Jason Ellis, IBM T.J. Watson Research Center Nicolas Ducheneaut, Palo Alto Research Center

Add to Reading List

Source URL: jellis.org

Language: English - Date: 2011-11-07 19:00:33
406World Wide Web / Twitter / Real-time web / Social media / Text messaging / Microblogging / Latent Dirichlet allocation / Topic model / Virtual community / Technology / Statistical natural language processing / Computing

On Modeling Community Behaviors and Sentiments in Microblogging Tuan-Anh Hoang∗ William W. Cohen† Abstract

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-03-10 14:57:33
407Internet / Computing / Computer-mediated communication / Phishing / Social engineering / Internet privacy / Social networking service / Educational technology / Virtual world / Email / Spamming / Computer crimes

Microsoft Word - INternet Safety Standards.doc

Add to Reading List

Source URL: ed.sc.gov

Language: English - Date: 2012-02-01 15:03:35
408Computing / Internet / Google / Human–computer interaction / World Wide Web

The Haute Chick: Virtual Stocking Stuffer - GreatApps

Add to Reading List

Source URL: greatapps.com

Language: English - Date: 2012-12-13 15:51:56
409Digital media / Software / Blizzard games / Windows games / Virtual economy / World of Warcraft / Internet privacy / Blizzard / Email / Computer law / Blizzard Entertainment / Computing

Law Enforcement Guide to Requests for Information Last updated July 9, 2009 THIS GUIDE IS INTENDED SOLELY FOR USE BY BONA FIDE LAW ENFORCEMENT AGENCIES AND MAY NOT BE

Add to Reading List

Source URL: info.publicintelligence.net

Language: English - Date: 2014-09-02 09:35:50
410Web 2.0 / Blog hosting services / Virtual communities / Social media / BP / Social networking service / Myspace / Facebook / World Wide Web / Social information processing / Computing

Color profile: Disabled Composite Default ApDev screen / Securing the Clicks: Network Security in the Age of Social Media / Gary Bahadur et al[removed]Blind Folio 1

Add to Reading List

Source URL: www.mhprofessional.com

Language: English - Date: 2011-09-30 13:01:32
UPDATE