Sciweavers

11345 search results - page 1877 / 2269
» Foundations of Computer Science
Sort
View
SAC
2010
ACM
15 years 11 months ago
Hypothesis generation and ranking based on event similarities
Accelerated by the technological advances in the domain, the size of the biomedical literature has been growing rapidly. As a result, it is not feasible for individual researchers...
Taiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara
PERVASIVE
2010
Springer
15 years 11 months ago
Common Sense Community: Scaffolding Mobile Sensing and Analysis for Novice Users
As sensing technologies become increasingly distributed and democratized, citizens and novice users are becoming responsible for the kinds of data collection and analysis that have...
Wesley Willett, Paul M. Aoki, Neil Kumar, Sushmita...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 11 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
ICDS
2009
IEEE
15 years 11 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
ICDS
2009
IEEE
15 years 11 months ago
Anticipating the Digital University
The University of the Digital Society is based on interactions that facilitate learning in a new pragmatic context. Catalysts involved in the learning process replace the traditio...
Mihai Nadin
« Prev « First page 1877 / 2269 Last » Next »