Sciweavers

1734 search results - page 263 / 347
» What works
Sort
View
IUI
2006
ACM
14 years 4 months ago
A cognitively based approach to affect sensing from text
Studying the relationship between natural language and affective information as well as assessing the underpinned affective qualities of natural language are becoming crucial for ...
Shaikh Mostafa Al Masum, Helmut Prendinger, Mitsur...
SIGCSE
2005
ACM
146views Education» more  SIGCSE 2005»
14 years 3 months ago
Using image processing projects to teach CS1 topics
As Computer Science educators, we know that students learn more from projects that are fun and challenging, that seem “real” to them, and that allow them to be creative in des...
Richard Wicentowski, Tia Newhall
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
ICMI
2005
Springer
104views Biometrics» more  ICMI 2005»
14 years 3 months ago
Analyzing and predicting focus of attention in remote collaborative tasks
To overcome the limitations of current technologies for remote collaboration, we propose a system that changes a video feed based on task properties, people’s actions, and messa...
Jiazhi Ou, Lui Min Oh, Susan R. Fussell, Tal Blum,...
MOBICOM
2004
ACM
14 years 3 months ago
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
One key usage of VANET is to support vehicle safety applications. This use case is characterized by the prominence of broadcasts in scaled settings. In this context, we try to ans...
Marc Torrent-Moreno, Daniel Jiang, Hannes Hartenst...