Sciweavers

1860 search results - page 292 / 372
» Structured Multimedia Authoring
Sort
View
CSCW
2010
ACM
15 years 4 months ago
Receptionist or information kiosk: how do people talk with a robot?
The schema or mental structures that people apply towards other people has been shown to influence the way people cooperate with others. Schemas evoke behavioral scripts. In this ...
Min Kyung Lee, Sara B. Kiesler, Jodi Forlizzi
IUI
2010
ACM
15 years 4 months ago
Lowering the barriers to website testing with CoTester
In this paper, we present CoTester, a system designed to decrease the difficulty of testing web applications. CoTester allows testers to create test scripts that are represented ...
Jalal Mahmud, Tessa Lau
TEI
2010
ACM
163views Hardware» more  TEI 2010»
15 years 4 months ago
A 6DoF fiducial tracking method based on topological region adjacency and angle information for tangible interaction
In this paper, we describe a new method for camera-based fiducial tracking. Our new method is based on the combination of topological region adjacency and angle information, where...
Hiroki Nishino
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 4 months ago
Resolving Identity Uncertainty with Learned Random Walks
A pervasive problem in large relational databases is identity uncertainty which occurs when multiple entries in a database refer to the same underlying entity in the world. Relati...
Ted Sandler, Lyle H. Ungar, Koby Crammer