Sciweavers

320 search results - page 45 / 64
» Completing design in use: closing the appropriation cycle
Sort
View
DIM
2008
ACM
13 years 10 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
MONET
2007
111views more  MONET 2007»
13 years 8 months ago
Resource Discovery in Activity-Based Sensor Networks
— This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level conc...
Doina Bucur, Jakob E. Bardram
CASCON
1992
163views Education» more  CASCON 1992»
13 years 9 months ago
Practical metaprogramming
Metaprogramming is the process of specifying generic software source templates from which classes of software components, or parts thereof, can be automatically instantiated to pr...
James R. Cordy, Medha Shukla
SIGUCCS
2000
ACM
14 years 23 days ago
Automating Residence Hall Internet Signups
As colleges and universities are moving into the realm of providing Internet connections to the residence dormitories (ResNet), the local help desk is becoming the focal point for...
John R. Miller, Tom Peterson
CSREAEEE
2007
136views Business» more  CSREAEEE 2007»
13 years 10 months ago
Virtual Apparatus Framework Approach to Constructing Adaptive Tutorials
- We present the Adaptive eLearning Platform (AeLP) – a platform solution for creating rich, interactive, and highly visual, adaptive eLearning activities designed using Virtual ...
Dror Ben-Naim, Nadine Marcus, Michael Bain