Sciweavers

448 search results - page 31 / 90
» Who is in Control
Sort
View
CHI
2004
ACM
16 years 4 months ago
Off-task behavior in the cognitive tutor classroom: when students "game the system"
We investigate the prevalence and learning impact of different types of off-task behavior in classrooms where students are using intelligent tutoring software. We find that within...
Ryan Shaun Baker, Albert T. Corbett, Kenneth R. Ko...
VIP
2001
15 years 5 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
CIDR
2007
113views Algorithms» more  CIDR 2007»
15 years 5 months ago
Securing history: Privacy and accountability in database systems
Databases that preserve a historical record of activities and data offer the important benefit of system accountability: past events can be analyzed to detect breaches and maint...
Gerome Miklau, Brian Neil Levine, Patrick Stahlber...
ICFP
2001
ACM
16 years 3 months ago
Developing a Stage Lighting System from Scratch
Lula is a system for computer-assisted stage lighting design and control. Whereas other systems for the same purpose are usually the results of long chains of incremental improvem...
Michael Sperber
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 10 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis