Sciweavers

4445 search results - page 784 / 889
» Reflective Authorization Systems
Sort
View
KDD
2008
ACM
211views Data Mining» more  KDD 2008»
15 years 10 months ago
ArnetMiner: extraction and mining of academic social networks
This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting ...
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zha...
96
Voted
CHI
2006
ACM
15 years 10 months ago
Attention funnel: omnidirectional 3D cursor for mobile augmented reality platforms
The attention funnel is a general purpose AR interface technique that interactively guides the attention of a user to any object, person, or place in space. The technique utilizes...
Frank Biocca, Arthur Tang, Charles B. Owen, Fan Xi...
CHI
2006
ACM
15 years 10 months ago
Because I carry my cell phone anyway: functional location-based reminder applications
Although they have potential, to date location-based information systems have not radically improved the way we interact with our surroundings. To study related issues, we develop...
Pamela J. Ludford, Dan Frankowski, Ken Reily, Kurt...
CHI
2005
ACM
15 years 10 months ago
Examining task engagement in sensor-based statistical models of human interruptibility
The computer and communication systems that office workers currently use tend to interrupt at inappropriate times or unduly demand attention because they have no way to determine ...
James Fogarty, Andrew Jensen Ko, Htet Htet Aung, E...
CHI
2005
ACM
15 years 10 months ago
Smart sinks: real-world opportunities for context-aware interaction
Can implicit interaction with a computer easily drive useful interface improvements in physical world settings? This paper presents a case study presenting multiple such context-a...
Leonardo Bonanni, Ernesto Arroyo, Chia-Hsun Lee, T...