Sciweavers

1625 search results - page 225 / 325
» Intentionality
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
ARVLSI
1999
IEEE
162views VLSI» more  ARVLSI 1999»
15 years 8 months ago
Conjunction Search Using a 1-D, Analog VLSI-based, Attentional Search/Tracking Chip
The ability of animals to select a limited region of sensory space for scrutiny is an important factor in dealing with cluttered or complex sensory environments. Such an attention...
Timothy K. Horiuchi, Ernst Niebur
CHI
1999
ACM
15 years 8 months ago
Touch-Sensing Input Devices
We can touch things, and our senses tell us when our hands are touching something. But most computer input devices cannot detect when the user touches or releases the device or so...
Ken Hinckley, Mike Sinclair
MM
1999
ACM
176views Multimedia» more  MM 1999»
15 years 8 months ago
Modeling focus of attention for meeting indexing
—A user’s focus of attention plays an important role in human–computer interaction applications, such as a ubiquitous computing environment and intelligent space, where the u...
Rainer Stiefelhagen, Jie Yang, Alex Waibel
UIST
1999
ACM
15 years 8 months ago
Sketching with Projective 2D Strokes
Freehand sketching has long had appeal as an artistic medium for conceptual design because of its immediacy in capturing and communicating design intent and visual experience. We ...
Osama Tolba, Julie Dorsey, Leonard McMillan