Sciweavers

2648 search results - page 320 / 530
» Human Factors In Computer Security
Sort
View
AAAI
2000
15 years 4 months ago
The Game of Hex: An Automatic Theorem Proving Approach to Game Programming
The game of Hex is a two-player game with simple rules, a deep underlying mathematical beauty, and a strategic complexity comparable to that of Chess and Go. The massive game-tree...
Vadim V. Anshelevich
125
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Fast query by example of environmental sounds via robust and efficient cluster-based indexing
There has been much recent progress in the technical infrastructure necessary to continuously characterize and archive all sounds, or more precisely auditory streams, that occur w...
Jiachen Xue, Gordon Wichern, Harvey D. Thornburg, ...
119
Voted
WIKIS
2006
ACM
15 years 9 months ago
How to use a Wiki in education: 'Wiki based effective constructive learning'
Learning effectiveness depends on a large range of parameters. Learners’ activity has an important impact on long-term learning and comprehension of difficult concepts [1]. Coll...
Michele Notari
116
Voted
UIST
2005
ACM
15 years 9 months ago
PlayAnywhere: a compact interactive tabletop projection-vision system
We introduce PlayAnywhere, a front-projected computer vision-based interactive table system which uses a new commercially available projection technology to obtain a compact, self...
Andrew D. Wilson
102
Voted
CSCW
2004
ACM
15 years 9 months ago
Lilsys: Sensing Unavailability
As communications systems increasingly gather and propagate information about people’s reachability or “presence”, users need better tools to minimize undesired interruption...
James Begole, Nicholas E. Matsakis, John C. Tang