Sciweavers

2399 search results - page 106 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2003
ACM
16 years 4 months ago
Mobile computing in the retail arena
Although PDAs typically run applications in a "standalone" mode, they are increasingly equipped with wireless communications, which makes them useful in new domains. Thi...
Erica Newcomb, Toni Pashley, John T. Stasko
HHCI
2000
15 years 7 months ago
Haptic Graphs for Blind Computer Users
In this paper we discuss the design of computer-based haptic graphs for blind and visually impaired people with the support of our preliminary experimental results. Since visual i...
Wai Yu, Rameshsharma Ramloll, Stephen A. Brewster
ICIP
2006
IEEE
16 years 5 months ago
Virtual Craniofacial Reconstruction from Computed Tomography Image Sequences Exhibiting Multiple Fractures
A novel procedure for in-silico (virtual) craniofacial reconstruction of human mandibles with multiple fractures from a sequence of Computed Tomography (CT) images is presented. T...
Ananda S. Chowdhury, Suchendra M. Bhandarkar, Robe...
FLAIRS
2010
15 years 6 months ago
Towards A Computational Assessment of Freewriting Quality
This study examines the linguistic features of freewrites and how those features relate to human scores of freewrite quality. Freewriting is a common prewriting strategy that has ...
Jennifer L. Weston, Scott A. Crossley, Danielle S....
CN
2007
137views more  CN 2007»
15 years 3 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia