Sciweavers

11065 search results - page 2178 / 2213
» Education
Sort
View
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CHI
2008
ACM
15 years 1 months ago
Implicit user-adaptive system engagement in speech and pen interfaces
As emphasis is placed on developing mobile, educational, and other applications that minimize cognitive load on users, it is becoming more essential to base interface design on im...
Sharon L. Oviatt, Colin Swindells, Alexander M. Ar...
CSEE
2008
Springer
15 years 1 months ago
An Evaluation of a Mobile Game Concept for Lectures
This paper describes an evaluation of a new game concept, Lecture Quiz, which can be used in lectures in higher education to promote strong student participation and variation in ...
Alf Inge Wang, Terje Øfsdahl, Ole Kristian ...
DEBS
2008
ACM
15 years 1 months ago
Top-k/w publish/subscribe: finding k most relevant publications in sliding time window w
Existing content-based publish/subscribe systems are designed assuming that all matching publications are equally relevant to a subscription. As we cannot know in advance the dist...
Kresimir Pripuzic, Ivana Podnar Zarko, Karl Aberer
FGR
2008
IEEE
166views Biometrics» more  FGR 2008»
15 years 1 months ago
Recognizing talking faces from acoustic Doppler reflections
Face recognition algorithms typically deal with the classification of static images of faces that are obtained using a camera. In this paper we propose a new sensing mechanism bas...
Kaustubh Kalgaonkar, Bhiksha Raj
« Prev « First page 2178 / 2213 Last » Next »