Sciweavers

1172 search results - page 163 / 235
» Who killed design
Sort
View
CHI
2007
ACM
13 years 12 months ago
The validity of a virtual human experience for interpersonal skills education
Any new tool introduced for education needs to be validated. We developed a virtual human experience called the Virtual Objective Structured Clinical Examination (VOSCE). In the V...
Kyle Johnsen, Andrew Raij, Amy O. Stevens, D. Scot...
DIAGRAMS
2008
Springer
13 years 12 months ago
Spider Diagrams of Order and a Hierarchy of Star-Free Regular Languages
Abstract. The spider diagram logic forms a fragment of constraint diagram logic and is designed to be primarily used as a diagrammatic software specification tool. Our interest is ...
Aidan Delaney, John Taylor, Simon J. Thompson
DIM
2008
ACM
13 years 12 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
ECAI
2008
Springer
13 years 12 months ago
A Truthful Two-Stage Mechanism for Eliciting Probabilistic Estimates with Unknown Costs
This paper reports on the design of a novel two-stage mechanism, based on strictly proper scoring rules, that motivates selfish rational agents to make a costly probabilistic estim...
Athanasios Papakonstantinou, Alex Rogers, Enrico H...
INFOSCALE
2007
ACM
13 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü