Sciweavers

35419 search results - page 53 / 7084
» How are we doing
Sort
View
CHI
2010
ACM
15 years 3 months ago
How routine learners can support family coordination
Researchers have detailed the importance of routines in how people live and work, while also cautioning system designers about the importance of people's idiosyncratic behavi...
Scott Davidoff, John Zimmerman, Anind K. Dey
ESWS
2009
Springer
15 years 8 months ago
Media Meets Semantic Web - How the BBC Uses DBpedia and Linked Data to Make Connections
Abstract. In this paper, we describe how the BBC is working to integrate data and linking documents across BBC domains by using Semantic Web technology, in particular Linked Data, ...
Georgi Kobilarov, Tom Scott, Yves Raimond, Silver ...
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
128
Voted
IJDET
2010
130views more  IJDET 2010»
15 years 19 days ago
A Unified Learning Style Model for Technology-Enhanced Learning: What, Why and How?
: This paper deals with the use of learning styles in technology-enhanced learning, by introducing a so-called "Unified Learning Style Model" (ULSM). The article aims at ...
Elvira Popescu
DIAU
2000
Springer
15 years 7 months ago
The Disadvantages of Free MIX Routes and how to Overcome Them
There are different methods to build an anonymity service using MIXes. A substantial decision for doing so is the method of choosing the MIX route. In this paper we compare two sp...
Oliver Berthold, Andreas Pfitzmann, Ronny Standtke