Sciweavers

3747 search results - page 263 / 750
» Active Operations on Collections
Sort
View
ACMDIS
2006
ACM
14 years 1 months ago
Randomness as a resource for design
Randomness is being harnessed in the design of some interactive systems. This is observed in random blogs, random web searching, and in particular Apple's iPod Shuffle. Yet t...
Tuck Wah Leong, Frank Vetere, Steve Howard
ECTEL
2006
Springer
14 years 1 months ago
An Example of Participatory Design Methodology in a Project which Aims at Developing Individual and Organisational Learning in C
The experience described in this paper is being developed in the framework of the PALETTE1 project by two teams of researchers involved in collecting information from some Communi...
Amaury Daele, Martin Erpicum, Liliane Esnault, Fab...
ICISC
2007
102views Cryptology» more  ICISC 2007»
13 years 11 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
IJCAI
2007
13 years 11 months ago
Augmented Experiment: Participatory Design with Multiagent Simulation
To test large scale socially embedded systems, this paper proposes a multiagent-based participatory design that consists of two steps; 1) participatory simulation, where scenario-...
Toru Ishida, Yuu Nakajima, Yohei Murakami, Hideyuk...
TRECVID
2008
13 years 11 months ago
LIG and LIRIS at TRECVID 2008: High Level Feature Extraction and Collaborative Annotation
This paper describes our participations of LIG and LIRIS to the TRECVID 2008 High Level Features detection task. We evaluated several fusion strategies and especially rank fusion....