Sciweavers

1465 search results - page 45 / 293
» Making the Correct Mistakes
Sort
View
ALT
2005
Springer
15 years 6 months ago
Teaching Learners with Restricted Mind Changes
Within learning theory teaching has been studied in various ways. In a common variant the teacher has to teach all learners that are restricted to output only consistent hypotheses...
Frank J. Balbach, Thomas Zeugmann
WISTP
2010
Springer
15 years 4 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ACSAC
2009
IEEE
15 years 4 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
CLEF
2007
Springer
15 years 3 months ago
Overview of the ImageCLEFmed 2007 Medical Retrieval and Medical Annotation Tasks
This paper describes the medical image retrieval and medical image annotation tasks of ImageCLEF 2007. Separate sections describe each of the two tasks, with the participation and ...
Henning Müller, Thomas Deselaers, Thomas Mart...
TARK
2005
Springer
15 years 3 months ago
Individual error, group error, and the value of information
Abstract This paper studies the interaction of error and information both in a single-person setting and in an interactive setting. In contrast to Blackwell’s Theorem, which says...
Itai Sher