Sciweavers

13224 search results - page 2505 / 2645
» Self-monitoring for Computer Users
Sort
View
WABI
2009
Springer
102views Bioinformatics» more  WABI 2009»
14 years 2 months ago
A Tree Based Method for the Rapid Screening of Chemical Fingerprints
Background: The fingerprint of a molecule is a bitstring based on its structure, constructed such that structurally similar molecules will have similar fingerprints. Molecular fin...
Thomas G. Kristensen, Jesper Nielsen, Christian N....
CIKM
2009
Springer
14 years 2 months ago
Feature selection for ranking using boosted trees
Modern search engines have to be fast to satisfy users, so there are hard back-end latency requirements. The set of features useful for search ranking functions, though, continues...
Feng Pan, Tim Converse, David Ahn, Franco Salvetti...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
MHCI
2009
Springer
14 years 2 months ago
Fixed in time and "time in motion": mobility of vision through a SenseCam lens
SenseCam is an automatic wearable camera, often seen as a tool for the creation of digital memories. In this paper, we report findings from a field trial in which SenseCams were w...
Siân E. Lindley, Richard H. R. Harper, David...
ACMACE
2009
ACM
14 years 2 months ago
Power explorer: a casual game style for encouraging long term behavior change among teenagers
When it comes to motivating teenagers towards energy awareness, new approaches need to be considered. One such is the use of pervasive games connected to the players own energy co...
Anton Gustafsson, Magnus Bång, Mattias Svahn
« Prev « First page 2505 / 2645 Last » Next »