Sciweavers

2648 search results - page 459 / 530
» Human Factors In Computer Security
Sort
View
MM
2010
ACM
164views Multimedia» more  MM 2010»
14 years 8 months ago
Visual search applications for connecting published works to digital material
Visual search connects physical (offline) objects with (online) digital media. Using objects from the environment, like newspapers, magazines, books and posters, we can retrieve s...
Jamey Graham, Jorge Moraleda, Jonathan J. Hull, Ti...
SAICSIT
2010
ACM
14 years 7 months ago
Determining the user profile for an adaptable training platform
Adaptive computer-based training systems aim to enhance the learning experience by personalising the presentation and content delivery according to the preferences of each particu...
Mardé Greeff, Quentin Williams, Roné...
SIGSOFT
2010
ACM
14 years 7 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
UIST
2010
ACM
14 years 7 months ago
Combining multiple depth cameras and projectors for interactions on, above and between surfaces
Instrumented with multiple depth cameras and projectors, LightSpace is a small room installation designed to explore a variety of interactions and computational strategies related...
Andrew D. Wilson, Hrvoje Benko
UIST
2010
ACM
14 years 7 months ago
TwinSpace: an infrastructure for cross-reality team spaces
We introduce TwinSpace, a flexible software infrastructure for combining interactive workspaces and collaborative virtual worlds. Its design is grounded in the need to support dee...
Derek F. Reilly, Hafez Rouzati, Andy Wu, Jee Yeon ...