Sciweavers

2648 search results - page 345 / 530
» Human Factors In Computer Security
Sort
View
MOBISYS
2004
ACM
16 years 2 months ago
Impromptu: Managing Networked Audio Applications for Mobile Users
This paper discusses the software architecture of Impromptu, a mobile IP-based audio computing platform, with an associated set of network-based applications and services. Impromp...
Chris Schmandt, Kwan Hong Lee, Jang Kim, Mark S. A...
147
Voted
GROUP
2009
ACM
15 years 10 months ago
The dissemination of knowledge management
Our study on a community of knowledge management (KM) practitioners in the aerospace industry reveals challenges in the dissemination of KM concepts and tools. In this paper, we i...
Hiroko Wilensky, David F. Redmiles, Norman Makoto ...
144
Voted
MM
2009
ACM
196views Multimedia» more  MM 2009»
15 years 10 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
138
Voted
ACMSE
2006
ACM
15 years 9 months ago
Using visual attention to extract regions of interest in the context of image retrieval
Recent research on computational modeling of visual attention has demonstrated that a bottom-up approach to identifying salient regions within an image can be applied to diverse a...
Oge Marques, Liam M. Mayron, Gustavo B. Borba, Hum...
ASSETS
2006
ACM
15 years 9 months ago
Designing a scripting language to help the blind program visually
The vast proliferation of GUI-based applications, including graphical interactive development environments (IDEs), has placed blind programmers at a severe disadvantage in a profe...
Kenneth G. Franqueiro, Robert M. Siegfried