Sciweavers

2648 search results - page 168 / 530
» Human Factors In Computer Security
Sort
View
ACMIDC
2010
15 years 2 months ago
vSked: an interactive visual schedule system for use in classrooms for children with autism
Children with autism often experience substantial challenges in understanding, structuring, and predicting the activities in their daily lives. The use of symbols to represent a s...
Michael T. Yeganyan, Meg Cramer, Lou Anne Boyd, Gi...
IJISEC
2006
108views more  IJISEC 2006»
15 years 4 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
ICIAP
2007
ACM
16 years 5 months ago
A robust measure for visual correspondence
In this paper a novel measure for visual correspondence is proposed, to be adopted for common computer vision tasks such as pattern matching, stereo vision, change detection. The ...
Federico Tombari, Luigi di Stefano, Stefano Mattoc...
ISAAC
2003
Springer
115views Algorithms» more  ISAAC 2003»
15 years 10 months ago
A Faster Lattice Reduction Method Using Quantum Search
We propose a new lattice reduction method. Our algorithm approximates shortest lattice vectors up to a factor ≤ (k/6)n/2k and makes use of Grover’s quantum search algorithm. Th...
Christoph Ludwig
CHI
2009
ACM
16 years 5 months ago
Give peace a chance: a call to design technologies for peace
Peace is an extremely important value for humankind, yet it has been largely ignored by the computing and human-computer interaction community. This paper seeks to begin a discuss...
Juan Pablo Hourcade