Sciweavers

362 search results - page 55 / 73
» Finding Motifs with Gaps
Sort
View
SIGCSE
2010
ACM
189views Education» more  SIGCSE 2010»
14 years 2 months ago
Principles of asking effective questions during student problem solving
Using effective teaching practices is a high priority for educators. One important pedagogical skill for computer science instructors is asking effective questions. This paper pre...
Kristy Elizabeth Boyer, William Lahti, Robert Phil...
ACSAC
2009
IEEE
14 years 2 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
HICSS
2009
IEEE
173views Biometrics» more  HICSS 2009»
14 years 2 months ago
Effects of Task Types and Communication Support Tools on E-Negotiation Performance: A Task-Technology Fit Perspective
The rapid growth of the Internet has made computer-mediated communication popular and the use of e-negotiation systems (ENS) has attracted great attention from researchers and pra...
Her-Sen Doong, Hui-Chih Wang, Chi-Kuang Hsieh
ISMIS
2009
Springer
14 years 2 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
14 years 1 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila