Sciweavers

228 search results - page 24 / 46
» A Cloze Test Authoring System and Its Automation
Sort
View
KBSE
2007
IEEE
15 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
CHI
2005
ACM
15 years 10 months ago
End user programming and context responsiveness in handheld prompting systems for persons with cognitive disabilities and caregi
Providing instructions via handheld prompters holds much promise for supporting independence for persons with cognitive disabilities. Because users of these tools are paired ? car...
Stefan Carmien
HUC
2010
Springer
14 years 10 months ago
CU-Later: a communication system considering time difference
Despite the widespread use of technology for social communication across distance, a number of barriers to such contact still exist. One such barrier is the problem of communicati...
Hitomi Tsujita, Svetlana Yarosh, Gregory D. Abowd
77
Voted
CHI
2011
ACM
14 years 1 months ago
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
176
Voted
ICLP
2009
Springer
15 years 10 months ago
Preprocessing for Optimization of Probabilistic-Logic Models for Sequence Analysis
Abstract. A class of probabilistic-logic models is considered, which increases the expressibility from HMM's and SCFG's regular and contextfree languages to, in principle...
Henning Christiansen, Ole Torp Lassen