Sciweavers

4445 search results - page 804 / 889
» Reflective Authorization Systems
Sort
View
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
15 years 10 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
CHI
2006
ACM
15 years 10 months ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
CHI
2006
ACM
15 years 10 months ago
A goal-oriented web browser
Many users are familiar with the interesting but limited functionality of Data Detector interfaces like Microsoft's Smart Tags and Google's AutoLink. In this paper we si...
Alexander Faaborg, Henry Lieberman
CHI
2006
ACM
15 years 10 months ago
Improving selection of off-screen targets with hopping
Many systems provide the user with a limited viewport of a larger graphical workspace. In these systems, the user often needs to find and select targets that are in the workspace,...
Pourang Irani, Carl Gutwin, Xing-Dong Yang
CHI
2006
ACM
15 years 10 months ago
Beyond record and play: backpacks: tangible modulators for kinetic behavior
Digital Manipulatives embed computation in familiar children's toys and provide means for children to design behavior. Some systems use "record and play" as a form ...
Hayes Raffle, Amanda J. Parkes, Hiroshi Ishii, Jos...