Sciweavers

18918 search results - page 410 / 3784
» Using Technology in Teaching
Sort
View
122
Voted
EUC
2005
Springer
15 years 10 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
CHI
2009
ACM
16 years 5 months ago
Multi-touch interface for controlling multiple mobile robots
We must give some form of a command to robots in order to have the robots do a complex task. An initial instruction is required even if they do their tasks autonomously. We theref...
Jun Kato, Daisuke Sakamoto, Masahiko Inami, Takeo ...
CHI
2007
ACM
16 years 5 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CHI
2005
ACM
16 years 5 months ago
Stencils-based tutorials: design and evaluation
Users of traditional tutorials and help systems often have difficulty finding the components described or pictured in the procedural instructions. Users also unintentionally miss ...
Caitlin Kelleher, Randy Pausch
CHI
2010
ACM
15 years 11 months ago
First-person cooking: a dual-perspective interactive kitchen counter
Hobby chefs have various ways to learn cooking—paper recipes or cooking shows, for example. However, information in paper recipes may require prior experience to be understood a...
Sarah Mennicken, Thorsten Karrer, Peter Russell, J...