Sciweavers

681 search results - page 93 / 137
» Fundamental Ethics in Information Systems
Sort
View
ACMSE
2006
ACM
15 years 5 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
VRST
2006
ACM
15 years 5 months ago
Mixed reality: are two hands better than one?
For simulating hands-on tasks, the ease of enabling two-handed interaction with virtual objects gives Mixed Reality (MR) an expected advantage over Virtual Reality (VR). A user st...
Aaron Kotranza, John Quarles, Benjamin Lok
IUI
2004
ACM
15 years 5 months ago
Evaluation of visual balance for automated layout
Layout refers to the process of determining the size and position of the visual objects in an information presentation. We introduce the WeightMap, a bitmap representation of the ...
Simon Lok, Steven Feiner, Gary Ngai
NOSSDAV
2010
Springer
15 years 4 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker
MC
2001
116views Computer Science» more  MC 2001»
15 years 1 months ago
Emotions and Multimodal Interface-Agents: A Sociological View
Designing human-computer interfaces that are easy and intuitive to use is important for the use of computer technology in general. Due to the growing complexity of information sys...
Daniel Moldt, Christian von Scheve