Sciweavers

3544 search results - page 578 / 709
» Information Security in Open Systems
Sort
View
ICWE
2004
Springer
15 years 4 months ago
Personalizing Web Sites for Mobile Devices Using a Graphical User Interface
Despite recent advances in wireless and portable hardware technologies, mobile access to the Web is often laborious. For this reason, several solutions have been proposed to custom...
Leonardo Teixeira Passos, Marco Tulio de Oliveira ...
106
Voted
CSMR
2010
IEEE
14 years 6 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...
CHI
2011
ACM
14 years 2 months ago
AnglePose: robust, precise capacitive touch tracking via 3d orientation estimation
We present a finger-tracking system for touch-based interaction which can track 3D finger angle in addition to position, using low-resolution conventional capacitive sensors, th...
Simon Rogers, John Williamson, Craig Stewart, Rode...
CHI
2006
ACM
15 years 11 months ago
Using hybrid networks for the analysis of online software development communities
Social network-based systems usually suffer from two major limitations: they tend to rely on a single data source (e.g. email traffic), and the form of network patterns is often p...
Yevgeniy Eugene Medynskiy, Nicolas Ducheneaut, Aym...
CHI
2005
ACM
15 years 11 months ago
An experiment in discovering personally meaningful places from location data
As mobile devices become location-aware, they offer the promise of powerful new applications. While computers work with physical locations like latitude and longitude, people thin...
Changqing Zhou, Pamela J. Ludford, Dan Frankowski,...