Sciweavers

77 search results - page 11 / 16
» Participatory design with individuals who have amnesia
Sort
View
87
Voted
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
NSPW
2004
ACM
15 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICSE
2001
IEEE-ACM
15 years 2 months ago
Improving Software Inspections by Using Reading Techniques
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
Forrest Shull, Ioana Rus, Victor R. Basili
IADIS
2004
14 years 11 months ago
A Different Pedagogical Approach to Teaching a Web Applications Course
This paper describes a different approach to teaching a web-applications course. Rather than lecturing, the instructor organizes material and serves as a guide as students work th...
Roy P. Pargas
HT
2009
ACM
15 years 4 months ago
2LIPGarden: 3D hypermedia for everyone
The early Web was hailed for being easy to use, and what is more important, giving people a chance to participate in its growth. The Web3D was believed to have potential to be the...
Jacek Jankowski, Izabela Irzynska, Bill McDaniel, ...