Sciweavers

26354 search results - page 5176 / 5271
» How we refactor, and how we know it
Sort
View
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
16 years 1 months ago
Learning to recognize brain specific proteins based on low-level features from on-line prediction servers
During the last decade, the area of bioinformatics has produced an overwhelming amount of data, with the recently published draft of the human genome being the most prominent exam...
Henrik Boström, Joakim Cöster, Lars Aske...
CHI
2008
ACM
16 years 1 months ago
Improving the performance of motor-impaired users with automatically-generated, ability-based interfaces
We evaluate two systems for automatically generating personalized interfaces adapted to the individual motor capabilities of users with motor impairments. The first system, SUPPLE...
Krzysztof Z. Gajos, Jacob O. Wobbrock, Daniel S. W...
91
Voted
CHI
2008
ACM
16 years 1 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
CHI
2007
ACM
16 years 1 months ago
Meta-analysis of correlations among usability measures
Understanding the relation between usability measures seems crucial to deepen our conception of usability and to select the right measures for usability studies. We present a meta...
Kasper Hornbæk, Effie Lai-Chong Law
CHI
2007
ACM
16 years 1 months ago
An eye tracking study of the effect of target rank on web search
Web search engines present search results in a rank ordered list. This works when what a user wants is near the top, but sometimes the information that the user really wants is lo...
Zhiwei Guan, Edward Cutrell
« Prev « First page 5176 / 5271 Last » Next »