Sciweavers

2648 search results - page 479 / 530
» Human Factors In Computer Security
Sort
View
SAC
2010
ACM
15 years 4 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
PETRA
2009
ACM
15 years 4 months ago
Ambient kitchen: designing situated services using a high fidelity prototyping environment
The Ambient Kitchen is a high fidelity prototype for exploring the design of pervasive computing algorithms and applications for everyday environments. The environment integrates ...
Patrick Olivier, Guangyou Xu, Andrew Monk, Jesse H...
UIST
2009
ACM
15 years 4 months ago
Bonfire: a nomadic system for hybrid laptop-tabletop interaction
We present Bonfire, a self-contained mobile computing system that uses two laptop-mounted laser micro-projectors to project an interactive display space to either side of a laptop...
Shaun K. Kane, Daniel Avrahami, Jacob O. Wobbrock,...
IUI
2006
ACM
15 years 3 months ago
Interactive learning of structural shape descriptions from automatically generated near-miss examples
Sketch interfaces provide more natural interaction than the traditional mouse and palette tool, but can be time consuming to build if they have to be built anew for each new domai...
Tracy Hammond, Randall Davis
ITICSE
2004
ACM
15 years 3 months ago
Using interactive technology in a short java course: an experience report
Keeping students alert and responsive during lectures is a challenge even for experienced teachers in small group settings. Research has shown the importance of student participat...
Roberto E. Lopez-Herrejon, Morrie Schulman