Sciweavers

130 search results - page 16 / 26
» Learning to Trust
Sort
View
FLAIRS
2007
14 years 11 months ago
Explaining Task Processing in Cognitive Assistants that Learn
As personal assistant software matures and assumes more autonomous control of its users’ activities, it becomes more critical that this software can explain its task processing....
Deborah L. McGuinness, Alyssa Glass, Michael Wolve...
101
Voted
IJET
2007
214views more  IJET 2007»
14 years 9 months ago
Employing Collaborative Learning Strategies in Online Conflict Resolution
—Although some critics may argue that conflict resolution cannot be carried out appropriately by virtual education, the basic elements of conflict present themselves within dista...
Samir Abou El-Seoud, Carme Anguera Iglesias, Marga...
CHI
2004
ACM
15 years 9 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 1 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
EDBT
2008
ACM
113views Database» more  EDBT 2008»
15 years 9 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar