Sciweavers

2648 search results - page 117 / 530
» Human Factors In Computer Security
Sort
View
TEC
2008
99views more  TEC 2008»
15 years 5 months ago
A Drug Candidate Design Environment Using Evolutionary Computation
Abstract-- This article describes the Candidate Design Environment we developed for efficient identification of promising drug candidates. Developing effective drugs from active mo...
M. Ihsan Ecemis, J. Wikel, C. Bingham, Eric Bonabe...
IUI
2012
ACM
14 years 20 days ago
Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images?
Recent computer vision approaches are aimed at richer image interpretations that extend the standard recognition of objects in images (e.g., cars) to also recognize object attribu...
William Curran, Travis Moore, Todd Kulesza, Weng-K...
HT
2005
ACM
15 years 10 months ago
Distributed, real-time computation of community preferences
We describe the integration of smart digital objects with Hebbian learning to create a distributed, real-time, scalable approach to adapting to a community's preferences. We ...
Thomas Lutkenhouse, Michael L. Nelson, Johan Bolle...
HUC
2003
Springer
15 years 10 months ago
Evaluation of Visual Notification Cues for Ubiquitous Computing
With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-in...
Peter Tarasewich, Christopher S. Campbell, Tian Xi...
IE
2007
15 years 6 months ago
Patterns and computer game design innovation
How can we help people design well-formed and innovative games? The design Patterns of Christopher Alexander is one methodology that has been proposed to assist in the design of w...
Kevin McGee