Sciweavers

2648 search results - page 160 / 530
» Human Factors In Computer Security
Sort
View
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
16 years 5 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
OOPSLA
2007
Springer
15 years 11 months ago
Notation and representation in collaborative object-oriented design: an observational study
Software designers in the object-oriented paradigm can make use of modeling tools and standard notations such as UML. Nevertheless, casual observations from collocated design coll...
Uri Dekel, James D. Herbsleb
BMCBI
2007
120views more  BMCBI 2007»
15 years 5 months ago
Recognition of interferon-inducible sites, promoters, and enhancers
Background: Computational analysis of gene regulatory regions is important for prediction of functions of many uncharacterized genes. With this in mind, search of the target genes...
Elena A. Ananko, Yury V. Kondrakhin, Tatyana I. Me...
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 5 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
119
Voted
HRI
2009
ACM
15 years 11 months ago
Relating initial turns of human-robot dialogues to discourse
User models can be useful for improving dialogue management. In this paper we analyze human-robot dialogues that occur during uncontrolled interactions and estimate relations betw...
Maxim Makatchev, Min Kyung Lee, Reid G. Simmons