Sciweavers

3560 search results - page 598 / 712
» Low-Fidelity Algorithm Visualization
Sort
View
101
Voted
CHI
2002
ACM
16 years 1 months ago
Movement model, hits distribution and learning in virtual keyboarding
In a ten-session experiment, six participants practiced typing with an expanding rehearsal method on an optimized virtual keyboard. Based on a large amount of in-situ performance ...
Shumin Zhai, Alison E. Sue, Johnny Accot
185
Voted
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 29 days ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
180
Voted
SIGMOD
2008
ACM
147views Database» more  SIGMOD 2008»
16 years 27 days ago
A demonstration of Cascadia through a digital diary application
The Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID ...
Christopher Ré, Dan Suciu, Evan Welbourne, ...
184
Voted
SIGMOD
2007
ACM
112views Database» more  SIGMOD 2007»
16 years 27 days ago
A random walk approach to sampling hidden databases
A large part of the data on the World Wide Web is hidden behind form-like interfaces. These interfaces interact with a hidden backend database to provide answers to user queries. ...
Arjun Dasgupta, Gautam Das, Heikki Mannila
67
Voted
ICIAP
2003
ACM
16 years 26 days ago
The mantis head camera (why the praying mantis is so good at catching its prey)
Inspired by the abilities of the praying mantis to judge distance to its prey before the strike by use of motionbased visually mediated odometry, we create miniature model for dep...
Igor Katsman, Ehud Rivlin