Sciweavers

215 search results - page 7 / 43
» Computing Branches Out: On Revitalizing Computing Education
Sort
View
HCI
2009
13 years 5 months ago
Social Practice: Becoming Enculturated in Human-Computer Interaction
Abstract. We present a new approach to the design, development and evaluation of embodied conversational agents (ECAs) that allows them to index identity through culturally and soc...
Justine Cassell
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Pebbling and Branching Programs Solving the Tree Evaluation Problem
We study restricted computation models related to the tree evaluation problem. The TEP was introduced in earlier work as a simple candidate for the (very) long term goal of separa...
Dustin Wehr
SIGCSE
2005
ACM
108views Education» more  SIGCSE 2005»
14 years 1 months ago
Teaching and learning ethics in computer science: walking the walk
The author shares techniques used in a successful "Ethics and Professionalism" class at California State University, San Bernardino. The author describes active learning...
Richard J. Botting
BC
2002
108views more  BC 2002»
13 years 7 months ago
Spike-timing-dependent plasticity: common themes and divergent vistas
Abstract. Recent experimental observations of spiketiming-dependent synaptic plasticity (STDP) have revitalized the study of synaptic learning rules. The most surprising aspect of ...
Ádám Kepecs, Mark C. W. van Rossum, ...
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
14 years 1 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai