Sciweavers

2399 search results - page 120 / 480
» On Authentication between Human and Computer
Sort
View
HCI
2011
14 years 7 months ago
Discovering Context: Classifying Tweets through a Semantic Transform Based on Wikipedia
By mapping messages into a large context, we can compute the distances between them, and then classify them. We test this conjecture on Twitter messages: Messages are mapped onto t...
Yegin Genc, Yasuaki Sakamoto, Jeffrey V. Nickerson
CHI
1998
ACM
15 years 8 months ago
The Progress Portfolio: Designing Reflective Tools for a Classroom Context
A great deal of effort has gone into developing open-ended inquiry activities for science education as well as complex computer tools for accessing scientific data to help student...
Ben Loh, Josh Radinsky, Eric Russell, Louis M. Gom...
SPW
2000
Springer
15 years 7 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
IJCINI
2007
110views more  IJCINI 2007»
15 years 3 months ago
Toward Autonomic Computing: Adaptive Neural Network for Trajectory Planning
: The theme of this issue of IJCINI is on cognitive mechanisms of autonomic computing and laws of human cooperative work organization. This editorial addresses key notions of this ...
Amar Ramdane-Cherif
ISWC
1998
IEEE
15 years 8 months ago
Design for Wearability
Digital Technology is constantly improving as information becomes wireless. These advances demand more wearable and mobile form factors for products that access information. A pro...
Francine Gemperle, Chris Kasabach, John Stivoric, ...