Sciweavers

3042 search results - page 499 / 609
» Designing for all users: including the odd users
Sort
View
JASIS
2007
101views more  JASIS 2007»
14 years 9 months ago
Mining Web functional dependencies for flexible information access
We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Saverio Perugini, Naren Ramakrishnan
JNCA
2007
136views more  JNCA 2007»
14 years 9 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
TVCG
1998
143views more  TVCG 1998»
14 years 9 months ago
Calibration-Free Augmented Reality
We describe the design and implementation of a videobasedaugmentedreality system capableof overlayingthreedimensional graphical objects on live video of dynamic environments. The ...
Kiriakos N. Kutulakos, James R. Vallino
PUC
2007
84views more  PUC 2007»
14 years 9 months ago
Interacting with mobile services: an evaluation of camera-phones and visual tags
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a userexperience study is described in which participants were both observed learning ...
Eleanor F. Toye, Richard Sharp, Anil Madhavapeddy,...