Sciweavers

7 search results - page 1 / 2
» Design in the absence of practice: breaching experiments
Sort
View
ACMDIS
2004
ACM
13 years 10 months ago
Design in the absence of practice: breaching experiments
IT research is often informed by studies of the practices that new technologies are to be embedded in and which they transform in their use. The development of mixed reality, tang...
Andy Crabtree
CSCW
2008
ACM
13 years 6 months ago
Deploying research technology in the home
Deploying research technology in real homes is an important way of uncovering new possibilities for design. We reflect upon the deployment of a simple technological arrangement wh...
Peter Tolmie, Andy Crabtree
CCS
2010
ACM
13 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
ECOOPW
1999
Springer
13 years 9 months ago
Deriving Object-Oriented Frameworks from Domain Knowledge
Although a considerable number of successful frameworks have been developed during the last decade, designing a high-quality framework is still a difficult task. Generally, it is ...
Mehmet Aksit
SIGCSE
2000
ACM
132views Education» more  SIGCSE 2000»
13 years 9 months ago
Empirical investigation throughout the CS curriculum
Empirical skills are playing an increasingly important role in the computing profession and our society. But while traditional computer science curricula are effective in teaching...
David W. Reed, Craig S. Miller, Grant Braught