Sciweavers

24529 search results - page 487 / 4906
» Computing on Authenticated Data
Sort
View
120
Voted
CHI
2003
ACM
16 years 5 months ago
Paper or interactive?: a study of prototyping techniques for ubiquitous computing environments
We studied the effects of varying the fidelity and automation levels of a Ubicomp application prototype. Our results show that the interactive prototype captured the same usabilit...
Linchuan Liu, Peter Khooshabeh
93
Voted
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 11 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
134
Voted
NIME
2004
Springer
96views Music» more  NIME 2004»
15 years 10 months ago
A Shape-Based Approach to Computer Vision Musical Performance Systems
In this paper, I will describe a computer vision-based musical performance system that uses morphological assessments to provide control data. Using shape analysis allows the syst...
Jean-Marc Pelletier
129
Voted
CHI
1997
ACM
15 years 9 months ago
Computational Models of Information Scent-Following in a Very Large Browsable Text Collection
An ecological-cognitive framework of analysis and a model-tracing architecture are presented and used in the analysis of data recorded from users browsing a large document collect...
Peter Pirolli
HYBRID
2007
Springer
15 years 9 months ago
Viability-Based Computations of Solutions to the Hamilton-Jacobi-Bellman Equation
Abstract. This article proposes a new capture basin algorithm for computing the numerical solution of a class of Hamilton-Jacobi-Bellman (HJB) partial differential equations (PDEs)...
Alexandre M. Bayen, Christian G. Claudel, Patrick ...