Sciweavers

217 search results - page 33 / 44
» Learning to Argue Using Computers - A View from Teachers, Re...
Sort
View
CHI
2010
ACM
14 years 3 months ago
Mobile-izing health workers in rural India
Researchers have long been interested in the potential of ICTs to enable positive change in developing regions communities. In these environments, ICT interventions often fail bec...
Divya Ramachandran, John Canny, Prabhu Dutta Das, ...
ICAI
2008
13 years 10 months ago
Nonrestrictive Concept-Acquisition by Representational Redescription
coarse procedures or very abstract frames from the point of view of algorithm, because some crucial issues like the representation, evolution, storage, and learning process of conc...
Hui Wei, Yan Chen
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 26 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
AR
2007
138views more  AR 2007»
13 years 8 months ago
Integrating robotics and neuroscience: brains for robots, bodies for brains
—Researchers in robotics and artificial intelligence have often looked at biology as a source of inspiration for solving their problems. From the opposite perspective, neuroscie...
Michele Rucci, Daniel Bullock, Fabrizio Santini
CHI
2004
ACM
14 years 9 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard