Sciweavers

2648 search results - page 518 / 530
» Human Factors In Computer Security
Sort
View
82
Voted
MIR
2010
ACM
255views Multimedia» more  MIR 2010»
15 years 3 months ago
Sharing of baseball event through social media
As real-time broadcasting services are becoming more popular, many people are sharing live events with remote users. Despite the success of real-time broadcasting services, a numb...
Hogun Park, Sun-Bum Youn, Eugene Hong, Changhyeon ...
GROUP
2003
ACM
15 years 2 months ago
Using cursor prediction to smooth telepointer jitter
Telepointers are an important type of embodiment in real-time distributed groupware. Telepointers can increase the presence of remote participants and can provide considerable awa...
Carl Gutwin, Jeff Dyck, Jennifer Burkitt
GROUP
2003
ACM
15 years 2 months ago
"Breaking the code", moving between private and public work in collaborative software development
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is esp...
Cleidson R. B. de Souza, David F. Redmiles, Paul D...
IUI
2003
ACM
15 years 2 months ago
A model of textual affect sensing using real-world knowledge
This paper presents a novel way for assessing the affective qualities of natural language and a scenario for its use. Previous approaches to textual affect sensing have employed k...
Hugo Liu, Henry Lieberman, Ted Selker
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
15 years 2 months ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz