Sciweavers

2648 search results - page 449 / 530
» Human Factors In Computer Security
Sort
View
JCDL
2010
ACM
238views Education» more  JCDL 2010»
15 years 3 months ago
BinarizationShop: a user-assisted software suite for converting old documents to black-and-white
Converting a scanned document to a binary format (black and white) is a key step in the digitization process. While many existing binarization algorithms operate robustly for well...
Fanbo Deng, Zheng Wu, Zheng Lu, Michael S. Brown
ICSE
2010
IEEE-ACM
15 years 2 months ago
A degree-of-knowledge model to capture source code familiarity
The size and high rate of change of source code comprising a software system make it difficult for software developers to keep up with who on the team knows about particular parts...
Thomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson ...
GROUP
2009
ACM
15 years 2 months ago
Personalized retrieval in social bookmarking
  Users  of  social  bookmarking  systems  take  advantage  of  pivot  browsing, an interaction technique allowing them to easily refine  lists of bookmarks t...
Scott Bateman, Michael J. Muller, Jill Freyne
IHM
2009
ACM
15 years 2 months ago
Wavelet menu: une adaptation des marking menus pour les dispositifs mobiles
Exploration and navigation in multimedia data hierarchies (e.g., photos, music) are frequent tasks on mobile devices. However, visualization and interaction are impoverished due t...
Jérémie Francone, Gilles Bailly, Lau...
IUI
2010
ACM
15 years 2 months ago
Automatic generation of research trails in web history
We propose the concept of research trails to help web users create and reestablish context across fragmented research processes without requiring them to explicitly structure and ...
Elin Rønby Pedersen, Karl Gyllstrom, Shengy...