Sciweavers

2379 search results - page 288 / 476
» Computer Science in the Information Age
Sort
View
CHI
1995
ACM
15 years 8 months ago
Belvedere: stimulating students' critical discussion
We describe “Belvedere,” a system to support students engaged in critical discussion of science and public policy issues. The design is intended to address cognitive and metac...
Massimo Paolucci, Daniel D. Suthers, Arlene Weiner
MOBISYS
2007
ACM
15 years 7 months ago
Automatic administration of the get up and go test
In-home monitoring using sensors has the potential to improve the life of elderly and chronically ill persons, assist their family and friends in supervising their status, and pro...
Dounia Berrada, Mario Romero, Gregory D. Abowd, Ma...
CCGRID
2010
IEEE
15 years 5 months ago
Bandwidth Allocation for Iterative Data-Dependent E-science Applications
We develop a novel framework for supporting e-Science applications that require streaming of information between sites. Using a Synchronous Dataflow (SDF) model, our framework inco...
Eun-Sung Jung, Sanjay Ranka, Sartaj Sahni
HCI
2009
15 years 2 months ago
Incorporating Cognitive Aspects in Digital Human Modeling
To build software which, at the press of a button, can tell you what cognition related hazards there are within an environment or a task, is probably well into the future if it is ...
Peter Thorvald, Dan Högberg, Keith Case
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs