Sciweavers

11573 search results - page 2200 / 2315
» Designing Relational Databases
Sort
View
WWW
2004
ACM
16 years 3 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
WWW
2004
ACM
16 years 3 months ago
Dynamic assembly of learning objects
This paper describes one solution to the problem of how to select sequence, and link Web resources into a coherent, focused organization for instruction that addresses a user'...
Robert G. Farrell, Soyini D. Liburd, John C. Thoma...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 3 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CHI
2009
ACM
16 years 3 months ago
Taking the time to care: empowering low health literacy hospital patients with virtual nurse agents
Ninety million Americans have inadequate health literacy, resulting in a reduced ability to read and follow directions in the healthcare environment. We describe an animated, empa...
Timothy W. Bickmore, Laura M. Pfeifer, Brian W. Ja...
PODC
2009
ACM
16 years 3 months ago
Brief announcement: minimum spanning trees and cone-based topology control
Consider a setting where nodes can vary their transmission power thereby changing the network topology, the goal of topology control is to reduce the transmission power while ensu...
Alejandro Cornejo, Nancy A. Lynch
« Prev « First page 2200 / 2315 Last » Next »