Sciweavers

1242 search results - page 150 / 249
» Digital Objects as Passwords
Sort
View
KDD
2009
ACM
206views Data Mining» more  KDD 2009»
15 years 10 months ago
Ranking-based clustering of heterogeneous information networks with star network schema
A heterogeneous information network is an information network composed of multiple types of objects. Clustering on such a network may lead to better understanding of both hidden s...
Yizhou Sun, Yintao Yu, Jiawei Han
CHI
2006
ACM
15 years 10 months ago
Attention funnel: omnidirectional 3D cursor for mobile augmented reality platforms
The attention funnel is a general purpose AR interface technique that interactively guides the attention of a user to any object, person, or place in space. The technique utilizes...
Frank Biocca, Arthur Tang, Charles B. Owen, Fan Xi...
KDD
2009
ACM
196views Data Mining» more  KDD 2009»
15 years 4 months ago
WhereNext: a location predictor on trajectory pattern mining
The pervasiveness of mobile devices and location based services is leading to an increasing volume of mobility data. This side effect provides the opportunity for innovative meth...
Anna Monreale, Fabio Pinelli, Roberto Trasarti, Fo...
VEE
2005
ACM
199views Virtualization» more  VEE 2005»
15 years 3 months ago
Escape analysis in the context of dynamic compilation and deoptimization
In object-oriented programming languages, an object is said to escape the method or thread in which it was created if it can also be accessed by other methods or threads. Knowing ...
Thomas Kotzmann, Hanspeter Mössenböck
VRST
2005
ACM
15 years 3 months ago
Rapid scene modelling, registration and specification for mixed reality systems
Many mixed-reality systems require real-time composition of virtual objects with real video. Such composition requires some description of the virtual and real scene geometries an...
Russell M. Freeman, Anthony Steed, Bin Zhou