Sciweavers

977 search results - page 161 / 196
» Social networks generate interest in computer science
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 9 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
LICS
2005
IEEE
15 years 5 months ago
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics
Three-valued models, in which properties of a system are either true, false or unknown, have recently been advocated as a better representation for reactive program abstractions g...
Patrice Godefroid, Michael Huth
VISUALIZATION
2005
IEEE
15 years 5 months ago
Visualization of White Matter Tracts with Wrapped Streamlines
Diffusion tensor imaging is a magnetic resonance imaging method which has gained increasing importance in neuroscience and especially in neurosurgery. It acquires diffusion proper...
Frank Enders, Natascha Sauber, Dorit Merhof, Peter...
MM
2004
ACM
174views Multimedia» more  MM 2004»
15 years 5 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
NSPW
2004
ACM
15 years 5 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...