Sciweavers

1363 search results - page 138 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
CHI
2008
ACM
15 years 11 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi
CHI
2007
ACM
15 years 11 months ago
Implicit coordination in firefighting practice: design implications for teaching fire emergency responders
Fire emergency response requires rapidly processing and communicating information to coordinate teams that protect lives and property. Students studying to become fire emergency r...
Zachary O. Toups, Andruid Kerne
PODS
2005
ACM
96views Database» more  PODS 2005»
15 years 11 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
CSCW
2010
ACM
15 years 8 months ago
The work of sustaining order in wikipedia: the banning of a vandal
In this paper, we examine the social roles of software tools in the English-language Wikipedia, specifically focusing on autonomous editing programs and assisted editing tools. Th...
R. Stuart Geiger, David Ribes
TEI
2010
ACM
144views Hardware» more  TEI 2010»
15 years 6 months ago
Tangible jukebox: back to palpable music
Since commercial musical recordings became available about a century ago and until very recently, they had always been distributed by means of a physical support. Nowadays that re...
Daniel Gallardo, Sergi Jordà