Sciweavers

2399 search results - page 57 / 480
» On Authentication between Human and Computer
Sort
View
COOPIS
2004
IEEE
15 years 1 months ago
Composing Mappings Between Schemas Using a Reference Ontology
Large-scale database integration requires a significant cost in developing a global schema and finding mappings between the global and local schemas. Developing the global schema r...
Eduard C. Dragut, Ramon Lawrence
ICPR
2004
IEEE
15 years 11 months ago
Exploring Human Eye Behaviour using a Model of Visual Attention
It is natural in a visual search to look at any object that is similar to the target so that it can be recognised and a decision made to end the search. Eye tracking technology of...
Fred Stentiford, Oyewole Oyekoya
CHI
2009
ACM
15 years 10 months ago
Species-appropriate computer mediated interaction
Given the importance of our non-human companions, do we not want to extend social media to our nonhuman co-species? If "human computer interfaces" should be designed for...
Robert E. McGrath
COSIT
2001
Springer
186views GIS» more  COSIT 2001»
15 years 2 months ago
Computational Structure in Three-Valued Nearness Relations
The development of cognitively plausible models of human spatial reasoning may ultimately result in computational systems that are better equipped to meet human needs. This paper e...
Matt Duckham, Michael F. Worboys
BMCBI
2006
141views more  BMCBI 2006»
14 years 9 months ago
Asymptotic behaviour and optimal word size for exact and approximate word matches between random sequences
Background: The number of k-words shared between two sequences is a simple and effcient alignment-free sequence comparison method. This statistic, D2, has been used for the cluste...
Sylvain Forêt, Miriam R. Kantorovitz, Conrad...