Sciweavers

3937 search results - page 228 / 788
» Questioning Ubiquitous Computing
Sort
View
141
Voted
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 9 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
ASSETS
2009
ACM
15 years 10 months ago
Comparing evaluation techniques for text readability software for adults with intellectual disabilities
In this paper, we compare alternative techniques for evaluating a software system for simplifying the readability of texts for adults with mild intellectual disabilities (ID). We ...
Matt Huenerfauth, Lijun Feng, Noemie Elhadad
STOC
2006
ACM
116views Algorithms» more  STOC 2006»
15 years 10 months ago
Information-theoretically secure protocols and security under composition
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies the security of these ...
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
125
Voted
CORR
2010
Springer
94views Education» more  CORR 2010»
14 years 11 months ago
Partitions and Coverings of Trees by Bounded-Degree Subtrees
This paper addresses the following questions for a given tree T and integer d 2: (1) What is the minimum number of degree-d subtrees that partition E(T)? (2) What is the minimum n...
David R. Wood
131
Voted
CHI
2008
ACM
16 years 4 months ago
Accountabilities of presence: reframing location-based systems
How do mobility and presence feature as aspects of social life? Using a case study of paroled offenders tracked via Global Positioning System (GPS), we explore the ways that locat...
Emily Troshynski, Charlotte P. Lee, Paul Dourish