Sciweavers

1395 search results - page 210 / 279
» Online Interactive Neuro-evolution
Sort
View
ACSAC
1999
IEEE
15 years 9 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
CHI
1999
ACM
15 years 9 months ago
The Reader's Helper: A Personalized Document Reading Environment
Over the last two centuries, reading styles have shifted away from the reading of documents from beginning to end and toward the skimming of documents in search of relevant inform...
Jamey Graham
CHI
1998
ACM
15 years 9 months ago
Beyond Paper: Supporting Active Reading with Free Form Digital Ink Annotations
Reading frequently involves not just looking at words on a page, but also underlining, highlighting and commenting, either on the text or in a separate notebook. This combination ...
Bill N. Schilit, Gene Golovchinsky, Morgan N. Pric...
COMPSAC
2009
IEEE
15 years 9 months ago
Hot Set Identification for Social Network Applications
Several operations of Web-based applications are optimized with respect to the set of resources that will receive the majority of requests in the near future, namely the hot set. U...
Claudia Canali, Michele Colajanni, Riccardo Lancel...
ACMIDC
2009
15 years 9 months ago
How children search the internet with keyword interfaces
Children are among the most frequent users of the Internet, yet searching and browsing the web can present many challenges. Studies over the past two decades on how children searc...
Allison Druin, Elizabeth Foss, Leshell Hatley, Eva...