Sciweavers

2674 search results - page 339 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
RTCSA
2007
IEEE
15 years 10 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
CHI
2010
ACM
15 years 9 months ago
Motivations to participate in online communities
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines...
Cliff Lampe, Rick Wash, Alcides Velasquez, Elif Oz...
CHI
2008
ACM
15 years 5 months ago
Testing vs. code inspection vs. what else?: male and female end users' debugging strategies
Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
CHI
2008
ACM
16 years 4 months ago
Feasibility and pragmatics of classifying working memory load with an electroencephalograph
A reliable and unobtrusive measurement of working memory load could be used to evaluate the efficacy of interfaces and to provide real-time user-state information to adaptive syst...
David B. Grimes, Desney S. Tan, Scott E. Hudson, P...
CHI
2004
ACM
16 years 4 months ago
a CAPpella: programming by demonstration of context-aware applications
Context-aware applications are applications that implicitly take their context of use into account by adapting to changes in a user's activities and environments. No one has ...
Anind K. Dey, Raffay Hamid, Chris Beckmann, Ian Li...