Sciweavers

2564 search results - page 208 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CHI
2005
ACM
16 years 3 months ago
Toward wearable social networking with iBand
The iBand is a wearable bracelet-like device that exchanges information about its users and their relationships. This exchange happens during the common gesture of the handshake, ...
Marije Kanis, Niall Winters, Stefan Agamanolis, An...
CHIMIT
2007
ACM
15 years 7 months ago
Supporting expertise awareness: finding out what others know
This paper presents an innovative approach to solve the problem of missing transparency of competencies within virtual organizations. We based our work on empirical studies to cop...
Christian Dörner, Volkmar Pipek, Markus Won
ACMIDC
2009
15 years 7 months ago
Ten design lessons from the literature on child development and children's use of technology
The existing knowledge base on child development offers a wealth of information that can be useful for the design of children's technology. Furthermore, academic journals and...
Helene Gelderblom, Paula Kotzé
ICIP
2003
IEEE
16 years 5 months ago
Top-down control of visual attention in object detection
Current computational models of visual attention focus on bottom-up information and ignore scene context. However, studies in visual cognition show that humans use context to faci...
Aude Oliva, Antonio B. Torralba, Monica S. Castelh...
118
Voted
HUC
2004
Springer
15 years 8 months ago
The NearMe Wireless Proximity Server
Abstract. NearMe is a server, algorithms, and application programming interfaces (APIs) for clients equipped with 802.11 wireless networking (Wi-Fi) to compute lists of people and ...
John Krumm, Ken Hinckley