Sciweavers

1625 search results - page 280 / 325
» Intentionality
Sort
View
MOBIHOC
2005
ACM
15 years 9 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
IUI
2010
ACM
15 years 6 months ago
A POMDP approach to P300-based brain-computer interfaces
Most of the previous work on non-invasive brain-computer interfaces (BCIs) has been focused on feature extraction and classification algorithms to achieve high performance for the...
Jaeyoung Park, Kee-Eung Kim, Sungho Jo
CHI
2010
ACM
15 years 4 months ago
d.note: revising user interfaces through change tracking, annotations, and alternatives
Interaction designers typically revise user interface prototypes by adding unstructured notes to storyboards and screen printouts. How might computational tools increase the effic...
Björn Hartmann, Sean Follmer, Antonio Ricciar...
TEI
2010
ACM
170views Hardware» more  TEI 2010»
15 years 4 months ago
Swing that thing: moving to move
Swing That Thing… is a practice-based doctoral research project that examines how technology in on and around the body might be used to poeticise experience. Outcomes include a ...
Danielle Wilde
EDBT
2010
ACM
153views Database» more  EDBT 2010»
15 years 4 months ago
Suggestion of promising result types for XML keyword search
Although keyword query enables inexperienced users to easily search XML database with no specific knowledge of complex structured query languages or XML data schemas, the ambigui...
Jianxin Li, Chengfei Liu, Rui Zhou, Wei Wang