Sciweavers

3570 search results - page 641 / 714
» A User Model for Information Erasure
Sort
View
CHI
2009
ACM
15 years 12 months ago
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving
We investigate how people adapt their strategy for interleaving multiple concurrent tasks to varying objectives. A study was conducted in which participants drove a simulated vehi...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
IUI
2010
ACM
15 years 8 months ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 5 months ago
The Influence of Instant Messaging Usage Behavior on Organizational Communication Satisfaction
In recent years, instant messaging (IM) has become a popular medium of online communication. While IM is expanding into the enterprise beyond personal use, it brings the convenien...
Shih-Ming Pi, Yi-Chih Liu, Tsang-Yao Chen, Shih-Hu...
MM
2006
ACM
142views Multimedia» more  MM 2006»
15 years 5 months ago
Large-scale video retrieval via semantic classification
ons for this project. Most recent ones are listed at the end of this abstract. In the future, feature selection will be integrated in the multi-class EM algorithm to improve the pe...
Hangzai Luo, Jianping Fan
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 4 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum