Sciweavers

VR
2010
IEEE
205views Virtual Reality» more  VR 2010»
13 years 2 months ago
Exploring individual user differences in the 2D/3D interaction with medical image data
Abstract User-centered design is often performed without regard to individual user differences. In this paper, we report results of an empirical study aimed to evaluate whether com...
Elena V. Zudilova-Seinstra, Boris W. van Schooten,...
UM
2010
Springer
13 years 2 months ago
Semantically-Enhanced Ubiquitous User Modeling
Semantically-enhanced Ubiquitous User Modeling aims at the management of distributed user models and the integration into ontologies to share user information amongst adaptive appl...
Till Plumbaum
TCOM
2010
133views more  TCOM 2010»
13 years 2 months ago
Transmission control in cognitive radio as a Markovian dynamic game: Structural result on randomized threshold policies
Abstract——This paper considers an uplink time division multiple access (TDMA) cognitive radio network where multiple cognitive radios (secondary users) attempt to access a spect...
J. Huang, V. Krishnamurthy
SPATIALCOGNITION
2010
Springer
13 years 2 months ago
Interactive Assistance for Tour Planning
It is often difficult for individual tourists to make a sightseeing tour plan because they do not have prior knowledge about the destination. Although several systems have been dev...
Yohei Kurata
RR
2010
Springer
13 years 2 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
RAID
2010
Springer
13 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
PVLDB
2010
66views more  PVLDB 2010»
13 years 2 months ago
Seaform: Search-As-You-Type in Forms
Form-style interfaces have been widely used to allow users to access information. In this demonstration paper, we develop a new search paradigm in form-style query interfaces, cal...
Hao Wu, Guoliang Li, Chen Li, Lizhu Zhou
PERCOM
2010
ACM
13 years 2 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi
IVA
2010
Springer
13 years 3 months ago
Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models
In earlier studies, user involvement with an embodied software agent and willingness to use that agent were partially determined by the aesthetics of the design and the moral fiber...
Matthijs Pontier, Ghazanfar F. Siddiqui, Johan F. ...
IV
2010
IEEE
140views Visualization» more  IV 2010»
13 years 3 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza