Sciweavers

2648 search results - page 90 / 530
» Human Factors In Computer Security
Sort
View
SIGCSE
2008
ACM
132views Education» more  SIGCSE 2008»
14 years 9 months ago
Course experiences of computing students with disabilities: four case studies
Inclusive education is the practice of making sure that all students of all abilities have positive learning experiences. The study presented in this paper explores the current st...
Katherine Deibel
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 4 months ago
Implementation issues for an interactive evolutionary computation system
The design and development of an Interactive Evolutionary Computation (IEC) system needs to take into account the implementation issues found when delivering the system to “Real...
Mark R. N. Shackelford
ICRA
2005
IEEE
143views Robotics» more  ICRA 2005»
15 years 3 months ago
Locomoting with Less Computation but More Morphology
– Biped walking is one of the most graceful movements observed in humans. Today’s humanoid robots, despite their undeniably impressive performance, are still a long way from th...
Kojiro Matsushita, Max Lungarella, Chandana Paul, ...
ASSETS
2010
ACM
14 years 10 months ago
Blind guidance using mobile computer vision: a usability study
We present a study focusing on the usability of a wayfinding and localization system for persons with visual impairment. This system uses special color markers, placed at key loca...
Roberto Manduchi, Sri Kurniawan, Homayoun Bagherin...
ACISP
2000
Springer
15 years 2 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski