Sciweavers

814 search results - page 132 / 163
» What designers want: Needs of interactive application design...
Sort
View
ECTEL
2009
Springer
14 years 1 months ago
Getting to Know Your User - Unobtrusive User Model Maintenance within Work-Integrated Learning Environments
Work-integrated learning (WIL) poses unique challenges for user model design: on the one hand users’ knowledge levels need to be determined based on their work activities – tes...
Stefanie N. Lindstaedt, Günter Beham, Barbara...
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
14 years 20 days ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
TSE
2010
102views more  TSE 2010»
13 years 3 months ago
Understanding Exception Handling: Viewpoints of Novices and Experts
Several recent studies indicate that many industrial applications exhibit poor quality in the design of exception-handling. To improve the quality of error-handling, we need to und...
Hina Shah, Carsten Görg, Mary Jean Harrold

Publication
303views
12 years 7 months ago
Evolutionary synthesis of analog networks
he significant increase in the available computational power that took place in recent decades has been accompanied by a growing interest in the application of the evolutionary ap...
Claudio Mattiussi
WWW
2009
ACM
14 years 9 months ago
RuralCafe: web search in the rural developing world
The majority of people in rural developing regions do not have access to the World Wide Web. Traditional network connectivity technologies have proven to be prohibitively expensiv...
Jay Chen, Lakshminarayanan Subramanian, Jinyang Li