Sciweavers

2648 search results - page 157 / 530
» Human Factors In Computer Security
Sort
View
HRI
2007
ACM
15 years 8 months ago
Developing performance metrics for the supervisory control of multiple robots
Efforts are underway to make it possible for a single operator to effectively control multiple robots. In these high workload situations, many questions arise including how many r...
Jacob W. Crandall, M. L. Cummings
IUI
2006
ACM
15 years 11 months ago
Activity-oriented context-aware adaptation assisting mobile geo-spatial activities
Human geospatial activities often involves the use of geographic information in mobile environment where the context of technology use is dynamic, complex, and unstable, creating ...
Guoray Cai, Yinkun Xue
ACMACE
2011
ACM
14 years 4 months ago
Mobile 3D graphics and virtual reality interaction
Mobile devices such as smartphones and tablets offer great new possibilities for the creation of 3D games and virtual reality environments. However, interaction with objects in th...
Wolfgang Hürst, Matthias Helder
EDBT
2010
ACM
206views Database» more  EDBT 2010»
15 years 11 months ago
Efficient computation of trade-off skylines
When selecting alternatives from large amounts of data, trade-offs play a vital role in everyday decision making. In databases this is primarily reflected by the top-k retrieval p...
Christoph Lofi, Ulrich Güntzer, Wolf-Tilo Bal...
WWW
2004
ACM
16 years 5 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...