Sciweavers

376 search results - page 42 / 76
» Teaching context in information security
Sort
View
CVPR
2008
IEEE
14 years 10 months ago
Estimating age, gender, and identity using first name priors
Recognizing people in images is one of the foremost challenges in computer vision. It is important to remember that consumer photography has a highly social aspect. The photograph...
Andrew C. Gallagher, Tsuhan Chen
COOPIS
2004
IEEE
13 years 11 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
JCDL
2006
ACM
116views Education» more  JCDL 2006»
14 years 2 months ago
Enabling exploration: travelers in the middle east archive
In this paper, we describe the Travelers in the Middle East Archive (TIMEA), a digital archive focused on Western explorations in the Middle East between the 18th and early 20th c...
Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck ...
SIGCSE
2004
ACM
82views Education» more  SIGCSE 2004»
14 years 1 months ago
Handwritten slides on a tabletPC in a discrete mathematics course
There are a wide variety of ways to present information at the front of a classroom. These include chalk on a blackboard, markers on a whiteboard, pens on transparencies, and comp...
Evan Golub
SIGCSE
2008
ACM
141views Education» more  SIGCSE 2008»
13 years 8 months ago
Broadening participation through scalable game design
Game development is quickly gaining popularity in introductory programming courses. Motivational and educational aspects of game development are hard to balance and often sacrific...
Alexander Repenning, Andri Ioannidou