Sciweavers

IJDAR
2007
69views more  IJDAR 2007»
13 years 4 months ago
User-driven page layout analysis of historical printed books
In this paper, based on the study of the specificity of historical printed books, we first explain the main error sources in classical methods used for page layout analysis. We sho...
Jean-Yves Ramel, S. Leriche, M. L. Demonet, S. Bus...
SIGIR
2008
ACM
13 years 4 months ago
Workshop on aggregated search
The Workshop on Aggregated seeks to define the research problems for aggregated search results, and to build a community of researchers working in this emerging area. Aggregated s...
Vanessa Murdock, Mounia Lalmas
SIGIR
2008
ACM
13 years 4 months ago
Task-aware search personalization
Search personalization has been pursued in many ways, in order to provide better result rankings and better overall search experience to individual users [5]. However, blindly app...
Julia Luxenburger, Shady Elbassuoni, Gerhard Weiku...
SCN
2008
Springer
106views Communications» more  SCN 2008»
13 years 4 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
HF
2007
131views more  HF 2007»
13 years 4 months ago
Formal Analysis and Automatic Generation of User Interfaces: Approach, Methodology, and an Algorithm
In this paper we propose a formal approach and methodology for analysis and generation of human-machine interfaces, with special emphasis on human-automation interaction. Our appr...
Michael Heymann, Asaf Degani
MIS
2006
Springer
159views Multimedia» more  MIS 2006»
13 years 4 months ago
Personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Tomislav Kosutic, Miran Mosmondor, Ivan Andrisek, ...
ENTCS
2007
91views more  ENTCS 2007»
13 years 4 months ago
Dynamic Reverse Code Generation for Backward Execution
The need for backward execution in debuggers has been raised a number of times. Backward execution helps a user naturally think backwards and, in turn, easily locate the cause of ...
Jooyong Lee
JMM2
2006
146views more  JMM2 2006»
13 years 4 months ago
Probabilistic Algorithms, Integration, and Empirical Evaluation for Disambiguating Multiple Selections in Frustum-Based Pointing
There are a few fundamental pointing-based user interface techniques for performing selections in 3D environments. One of these techniques is ray pointing, which makes selections b...
Greg S. Schmidt, Dennis G. Brown, Erik B. Tomlin, ...
JSAC
2008
76views more  JSAC 2008»
13 years 4 months ago
Rate-Based Equilibria in Collision Channels with Fading
We consider a wireless collision channel, shared by a finite number of users who transmit to a common base station. Each user wishes to minimize its average transmission rate (or p...
Ishai Menache, Nahum Shimkin
JOT
2008
62views more  JOT 2008»
13 years 4 months ago
An Increase In Value
Value is not always created as explicitly or as tangibly as with a product that benefits its user and its creator. Increasingly, value emerges from a set of activities and the kno...
John McGregor