Sciweavers

8655 search results - page 1438 / 1731
» Challenges for Trusted Computing
Sort
View
113
Voted
CHI
2008
ACM
16 years 3 months ago
CareLog: a selective archiving tool for behavior management in schools
Identifying the function of problem behavior can lead to the development of more effective interventions. One way to identify the function is through functional behavior assessmen...
Gillian R. Hayes, Lamar M. Gardere, Gregory D. Abo...
136
Voted
CHI
2007
ACM
16 years 3 months ago
Social practices in location-based collecting
The use of location-based technology to augment visitor experiences has received considerable attention over the years. In this paper, we take an alternative perspective on these ...
Kenton O'Hara, Tim Kindberg, Maxine Glancy, Lucian...
CHI
2004
ACM
16 years 3 months ago
Trading design spaces: exchanging ideas on physical design environments
Physical design environments are places that support people engaged in the spatial, physical, tangible act of creation. It is now possible to augment workspaces with an amazing ar...
Wendy Ju, Margot Brereton, Michael Haller, Amanda ...
CHI
2001
ACM
16 years 3 months ago
Chinese input with keyboard and eye-tracking: an anatomical study
Chinese input presents unique challenges to the field of human computer interaction. This study provides an anatomical analysis of today's standard Chinese input process, whi...
Jingtao Wang, Shumin Zhai, Hui Su
RECOMB
2005
Springer
16 years 3 months ago
Towards an Integrated Protein-Protein Interaction Network
Abstract. Protein-protein interactions play a major role in most cellular processes. Thus, the challenge of identifying the full repertoire of interacting proteins in the cell is o...
Ariel Jaimovich, Gal Elidan, Hanah Margalit, Nir F...
« Prev « First page 1438 / 1731 Last » Next »