Sciweavers

413 search results - page 69 / 83
» IT alignment: what have we learned
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
Minimal-Latency Secure Function Evaluation
Sander, Young and Yung recently exhibited a protocol for computing on encrypted inputs, for functions computable in NC1 . In their variant of secure function evaluation, Bob (the &...
Donald Beaver
LWA
2007
13 years 9 months ago
Taking the Teacher's Perspective for User Modeling in Complex Domains
Serious games that should adapt training to the individual might benefit from methods that are developed for intelligent tutoring systems. One method, model tracing, might be used...
Christian P. Janssen, Hedderik van Rijn
IJCAI
1997
13 years 9 months ago
Qualitative Relevance and Independence: A Roadmap
Several qualitative notions of epistemic dependence between propositions are studied. They are closely related to the ordinal notion of conditional possibility. What this paper pr...
Didier Dubois, Luis Fariñas del Cerro, Andr...
IFIP12
2009
13 years 5 months ago
Use of AI Techniques for Residential Fire Detection in Wireless Sensor Networks
: Early residential fire detection is important for prompt extinguishing and reducing damages and life losses. To detect fire, one or a combination of sensors and a detection algor...
Majid Bahrepour, Nirvana Meratnia, Paul J. M. Havi...
CHI
2011
ACM
12 years 11 months ago
Infrastructures for low-cost laptop use in Mexican schools
In recent years, a number of low-cost laptops have been created for children’s education, most notably the XO, developed by One Laptop per Child to embody principles of construc...
Ruy Cervantes, Mark Warschauer, Bonnie A. Nardi, N...