Sciweavers

2648 search results - page 50 / 530
» Human Factors In Computer Security
Sort
View
SIGCSE
2005
ACM
123views Education» more  SIGCSE 2005»
15 years 3 months ago
Diversifying the images of computer science: undergraduate women take on the challenge!
This paper tells the story of a student initiative, driven by a desire to diversify the images that surround the field of computer science and those who work in it. Categories and...
Carol Frieze
CHI
2010
ACM
14 years 11 months ago
Critical gameplay: software studies in computer gameplay
The computer game software with which we interact on a daily basis not only entertains us, it trains us into specific patterns. Critical Gameplay is a design practice which endeav...
Lindsay Grace
NIME
2001
Springer
148views Music» more  NIME 2001»
15 years 2 months ago
Principles for Designing Computer Music Controllers
This paper will present observations on the design, artistic, and human factors of creating digital music controllers. Specific projects will be presented, and a set of design pri...
Perry R. Cook
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
15 years 3 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
BMCBI
2008
128views more  BMCBI 2008»
14 years 10 months ago
Finding sequence motifs with Bayesian models incorporating positional information: an application to transcription factor bindin
Background: Biologically active sequence motifs often have positional preferences with respect to a genomic landmark. For example, many known transcription factor binding sites (T...
Nak-Kyeong Kim, Kannan Tharakaraman, Leonardo Mari...