Sciweavers

271 search results - page 44 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
CHI
2003
ACM
14 years 8 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
SAC
2009
ACM
14 years 12 days ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
ASSETS
2008
ACM
13 years 9 months ago
A3: a coding guideline for HCI+autism research using video annotation
Due to the profile of strengths and weaknesses indicative of autism spectrum disorders (ASD), technology may play a key role in ameliorating communication difficulties with this p...
Joshua M. Hailpern, Karrie Karahalios, James Halle...
CORR
2007
Springer
176views Education» more  CORR 2007»
13 years 7 months ago
Crystallization in large wireless networks
—We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K...
Veniamin I. Morgenshtern, Helmut Bölcskei
IJBRA
2010
89views more  IJBRA 2010»
13 years 6 months ago
Strategies for enhanced annotation of a microarray probe set
—We aim to determine the biological relevance of genes identified through microarray-mediated transcriptional profiling of Xenopus sensory organs and brain tissue. Genetic data...
TuShun R. Powers, Selene M. Virk, Elba E. Serrano