Sciweavers

436 search results - page 28 / 88
» Arguing for gaining access to information
Sort
View
MASCOTS
2004
15 years 1 months ago
Mining Performance Data from Sampled Event Traces
The prominent role of the memory hierarchy as one of the major bottlenecks in achieving good program performance has motivated the search for ways of capturing the memory performa...
Ricardo Portillo, Diana Villa, Patricia J. Teller,...
ASSETS
2005
ACM
15 years 1 months ago
Gestural text entry on multiple devices
We present various adaptations of the EdgeWrite unistroke text entry method that work on multiple computer input devices: styluses, touchpads, displacement and isometric joysticks...
Jacob O. Wobbrock, Brad A. Myers
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 9 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ECIS
2004
15 years 1 months ago
Mobilizing medical information and knowledge: some insights from a survey
The mobile medical information system investigated in the study is developed for mobilizing medical information and knowledge and for matching physicians' multiple needs, inc...
Shengnan Han, Ville Harkke, Pekka Mustonen, Matti ...
CHI
2000
ACM
15 years 4 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...