Sciweavers

2648 search results - page 169 / 530
» Human Factors In Computer Security
Sort
View
ACMACE
2005
ACM
15 years 10 months ago
SymBall: camera driven table tennis for mobile phones
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Mika Hakkarainen, Charles Woodward
BMCBI
2007
136views more  BMCBI 2007»
15 years 4 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
ISWC
2003
IEEE
15 years 10 months ago
Peer-to-Peer Policy Management System for Wearable Mobile Devices
Wearable computing devices are obviously made all the more powerful due to their ability to be innately mobile. With this in mind, spontaneous peer-to-peer networks may emerge amo...
Michael Massimi, Ursula Wolz
ADS
2004
Springer
15 years 10 months ago
Generating Socially Appropriate Tutorial Dialog
Analysis of student-tutor coaching dialogs suggest that good human tutors attend to and attempt to influence the motivational state of learners. Moreover, they are sensitive to the...
W. Lewis Johnson, Paola Rizzo, Wauter Bosma, Sande...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 7 months ago
From user comments to on-line conversations
We present an analysis of user conversations in on-line social media and their evolution over time. We propose a dynamic model that predicts the growth dynamics and structural pro...
Chunyan Wang, Mao Ye, Bernardo A. Huberman