Sciweavers

3042 search results - page 547 / 609
» Designing for all users: including the odd users
Sort
View
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 4 months ago
Instance Data Evaluation for Semantic Web-Based Knowledge Management Systems
As semantic web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content ...
Jiao Tao, Li Ding, Deborah L. McGuinness
72
Voted
JCDL
2006
ACM
143views Education» more  JCDL 2006»
15 years 3 months ago
Categorizing web search results into meaningful and stable categories using fast-feature techniques
When search results against digital libraries and web resources have limited metadata, augmenting them with meaningful and stable category information can enable better overviews ...
Bill Kules, Jack Kustanowitz, Ben Shneiderman
SENSYS
2005
ACM
15 years 3 months ago
Sympathy for the sensor network debugger
Being embedded in the physical world, sensor networks present a wide range of bugs and misbehavior qualitatively different from those in most distributed systems. Unfortunately, d...
Nithya Ramanathan, Kevin K. Chang, Rahul Kapur, Le...
VRST
2005
ACM
15 years 3 months ago
An integrated system: virtual reality, haptics and modern sensing technique (VHS) for post-stroke rehabilitation
In this paper, we introduce an interdisciplinary project, involving researchers from the fields of Physical Therapy, Computer Science, Psychology, Communication and Cell Neurobiol...
Shih-Ching Yeh, Albert A. Rizzo, Weirong Zhu, Jill...
SIGADA
2004
Springer
15 years 3 months ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis