Sciweavers

187 search results - page 33 / 38
» Mining Interpretable Human Strategies: A Case Study
Sort
View
IACR
2011
87views more  IACR 2011»
12 years 7 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
CHI
2001
ACM
14 years 7 months ago
Layered participatory analysis: new developments in the CARD technique
CARD (Collaborative Analysis of Requirements and Design) is an influential technique for participatory design and participatory analysis that is in use on three continents. This p...
Michael J. Muller
WCRE
2008
IEEE
14 years 1 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
ISMIR
2005
Springer
165views Music» more  ISMIR 2005»
14 years 27 days ago
Using a Pitch Detector for Onset Detection
A segmentation strategy is explored for monophonic instrumental pitched non-percussive material (PNP) which proceeds from the assertion that human-like event analysis can be found...
Nick Collins
PDC
2004
ACM
14 years 24 days ago
Socio-technical walkthrough: designing technology along work processes
How can the documentation of concepts for complex sociotechnical systems, such as the adoption of groupware, be incorporated into practices of PD? Documents are important in suppo...
Thomas Herrmann, Gabriele Kunau, Kai-Uwe Loser, Na...