Sciweavers

1527 search results - page 276 / 306
» What About Wednesday
Sort
View
GI
2007
Springer
14 years 1 months ago
Supporting Early Literacy with Augmented Books - Experiences with an Exploratory Study
: We here report on a study exploring the use of augmented books for early literacy education. Children aged 6-7 interacted alone and in pairs with an AR-book. The study was iterat...
Eva Hornecker, Andreas Dünser
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 1 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ICN
2007
Springer
14 years 1 months ago
Active Peer to Peer
—Peer to peer is an important way for files sharing. In existing P2P systems, users need to query and retrieve files, and have to know some knowledge, such as file names, keyword...
Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han
OOPSLA
2007
Springer
14 years 1 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
AICCSA
2006
IEEE
137views Hardware» more  AICCSA 2006»
14 years 1 months ago
Modeling Redundancy: Quantitative and Qualitative Models
Redundancy is a system property that generally refers to duplication of state information or system function. While redundancy is usually investigated in the context of fault tole...
Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shere...