Sciweavers

1519 search results - page 72 / 304
» What do they think
Sort
View
IEEEIAS
2008
IEEE
14 years 4 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
AIME
2005
Springer
14 years 3 months ago
Anatomical Sketch Understanding: Recognizing Explicit and Implicit Structure
Sketching is ubiquitous in medicine. Physicians commonly use sketches as part of their note taking in patient records and to help convey diagnoses and treatments to patients. Medic...
Peter Haddawy, Matthew N. Dailey, Ploen Kaewruen, ...
DIGRA
2005
Springer
14 years 3 months ago
The Ethics of Computer Game Design
Every choice implies responsibility. Responsibility implies ethical values imprinted in those choices. Computer games have been considered “a series of interesting choices”1 ....
Miguel Sicart
ATAL
2006
Springer
14 years 1 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss
DAGSTUHL
2007
13 years 11 months ago
End-User Software Engineering Position Paper
bstract, rather than through examples. I’d like to see the ability to demonstrate examples in concrete situations, have the system record them, and generalize them to yield a pro...
Henry Lieberman