Sciweavers

13370 search results - page 2599 / 2674
» Accessibility in Information Retrieval
Sort
View
CHI
2009
ACM
15 years 10 months ago
Blobby: how to guide a blind person
For the majority of blind people, walking in unknown places is a very difficult, or even impossible, task to perform, when without help. The adoption of the white cane is the main...
Hugo Nicolau, Joaquim A. Jorge, Tiago João ...
CHI
2009
ACM
15 years 10 months ago
Squidy: a zoomable design environment for natural user interfaces
We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a ...
Harald Reiterer, Roman Rädle, Werner A. K&oum...
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
15 years 10 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
CHI
2007
ACM
15 years 10 months ago
Multiple mice for retention tasks in disadvantaged schools
This study evaluates single-mouse and multiple-mouse configurations for computer-aided learning in schools where access to computers is limited due to resource constraints. Multim...
Udai Singh Pawar, Joyojeet Pal, Rahul Gupta, Kenta...
« Prev « First page 2599 / 2674 Last » Next »