15 resultados para talk-aloud protocols

em University of Southampton, United Kingdom


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the first part of a 2 part video from my talk in May 2008 on open source content creation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the second part of a 2 part video from my talk in May 2008 on open source content creation. Here I am talking about the Making of Doljer

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An introduction for students intending to design and conduct a survey. This is the prelude to a practical group activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Instead of using the technology for the mere recording and dissemination of lectures and other instructor-centred information, the project reported on in this article focused on enabling students to create their own podcasts for distribution to their peers. The article describes how engaging in the podcasting exercise promoted collaborative knowledge building among the student-producers, as evidenced through focus-group interviewing and an analysis of the products of their shared dialogue and reflection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction to interview data, how it is used and how and why it might be collected

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is a talk on the new University Open Data Service, some of the applications it's already being put to, and some of the things we hope to do next.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is video link to Jodie's talk: Exploitation in Communicative Capitalism from earlier this year which deals critically with blogging in relation to free-market economy.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Animation considering all key things to consider. Includes audio.