Sciweavers

561 search results - page 105 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
UIST
2004
ACM
15 years 2 months ago
A toolkit for managing user attention in peripheral displays
Traditionally, computer interfaces have been confined to conventional displays and focused activities. However, as displays become embedded throughout our environment and daily li...
Tara Matthews, Anind K. Dey, Jennifer Mankoff, Sco...
GROUP
2003
ACM
15 years 2 months ago
Using cursor prediction to smooth telepointer jitter
Telepointers are an important type of embodiment in real-time distributed groupware. Telepointers can increase the presence of remote participants and can provide considerable awa...
Carl Gutwin, Jeff Dyck, Jennifer Burkitt
90
Voted
SIGUCCS
2000
ACM
15 years 1 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
98
Voted
GECCO
2006
Springer
213views Optimization» more  GECCO 2006»
15 years 1 months ago
Evolutionary unit testing of object-oriented software using strongly-typed genetic programming
Evolutionary algorithms have successfully been applied to software testing. Not only approaches that search for numeric test data for procedural test objects have been investigate...
Stefan Wappler, Joachim Wegener
IJCNN
2000
IEEE
15 years 1 months ago
Pose Classification Using Support Vector Machines
The field of human-computer interaction has been widely investigated in the last years, resulting in a variety of systems used in different application fields like virtual reality...
Edoardo Ardizzone, Antonio Chella, Roberto Pirrone