Sciweavers

2674 search results - page 277 / 535
» Implementation issues for an interactive evolutionary comput...
Sort
View
ISSRE
2008
IEEE
15 years 11 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
CHI
2005
ACM
16 years 5 months ago
Glimpse: a novel input model for multi-level devices
We describe a technique that supports the previewing of navigation, exploration, and editing operations by providing convenient Undo for unsuccessful and/or undesirable actions on...
Clifton Forlines, Chia Shen
CHI
2004
ACM
16 years 5 months ago
eBooks with indexes that reorganize conceptually
Subject indexes were an important step forward for books because they enabled the comparison and correlations of information without extensive reading, re-reading and memorization...
Ed Huai-hsin Chi, Lichan Hong, Julie Heiser, Stuar...
CHI
2004
ACM
16 years 5 months ago
Anthropomorphic visualization: a new approach for depicting participants in online spaces
Anthropomorphic visualization is a new approach to presenting historical information about participants in online spaces using the human form as the basis for the visualization. V...
Ethan Perry, Judith S. Donath
CHI
2010
ACM
15 years 11 months ago
The infrastructure problem in HCI
HCI endeavors to create human-centered computer systems, but underlying technological infrastructures often stymie these efforts. We outline three specific classes of user experie...
W. Keith Edwards, Mark W. Newman, Erika Shehan Poo...