Sciweavers

1443 search results - page 237 / 289
» Aging Users are Still Users
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
14 years 4 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
TKDE
2010
224views more  TKDE 2010»
14 years 4 months ago
Non-Negative Matrix Factorization for Semisupervised Heterogeneous Data Coclustering
Coclustering heterogeneous data has attracted extensive attention recently due to its high impact on various important applications, such us text mining, image retrieval, and bioin...
Yanhua Chen, Lijun Wang, Ming Dong
TOG
2010
181views more  TOG 2010»
14 years 4 months ago
Context-based search for 3D models
Large corpora of 3D models, such as Google 3D Warehouse, are now becoming available on the web. It is possible to search these databases using a keyword search. This makes it poss...
Matthew Fisher, Pat Hanrahan
CHI
2011
ACM
14 years 1 months ago
Usable gestures for blind people: understanding preference and performance
Despite growing awareness of the accessibility issues surrounding touch screen use by blind people, designers still face challenges when creating accessible touch screen interface...
Shaun K. Kane, Jacob O. Wobbrock, Richard E. Ladne...
CHI
2011
ACM
14 years 1 months ago
Social media ownership: using twitter as a window onto current attitudes and beliefs
Social media, by its very nature, introduces questions about ownership. Ownership comes into play most crucially when we investigate how social media is saved or archived; how it ...
Catherine C. Marshall, Frank M. Shipman III