Sciweavers

3937 search results - page 287 / 788
» Questioning Ubiquitous Computing
Sort
View
PERVASIVE
2007
Springer
15 years 11 months ago
Ambient Information Systems: Evaluation in Two Paradigms
We take two paradigms for information systems development, functionalism and social relativism, and apply their assumptions to the evaluation of ambient information systems. Ambie...
Zachary Pousman, John T. Stasko
AIED
2005
Springer
15 years 10 months ago
Engagement tracing: using response times to model student disengagement
Time on task is an important predictor for how much students learn. However, students must be focused on their learning for the time invested to be productive. Unfortunately, stude...
Joseph E. Beck
ICALP
2005
Springer
15 years 10 months ago
On Steganographic Chosen Covertext Security
At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed ...
Nicholas Hopper
IEEEPACT
2000
IEEE
15 years 9 months ago
Exploring the Limits of Sub-Word Level Parallelism
Multimedia instruction set extensions have become a prominent feature in desktop microprocessor platforms, promising superior performance on a wide range of floating-point and int...
Kevin Scott, Jack W. Davidson
148
Voted
CHI
2000
ACM
15 years 9 months ago
Agents to assist in finding help
When a novice needs help, often the best solution is to find a human expert who is capable of answering the novice’s questions. But often, novices have difficulty characterizing...
Adriana Santarosa Vivacqua, Henry Lieberman