Sciweavers

2135 search results - page 349 / 427
» Supporting Unconstrained Interaction with Application Sharin...
Sort
View
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
15 years 10 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
MHCI
2009
Springer
15 years 4 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
CHI
2010
ACM
15 years 3 months ago
Estimating residual error rate in recognized handwritten documents using artificial error injection
Both handwriting recognition systems and their users are error prone. Handwriting recognizers make recognition errors, and users may miss those errors when verifying output. As a ...
Edward Lank, Ryan Stedman, Michael Terry
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
15 years 1 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
ACMACE
2005
ACM
14 years 12 months ago
AI middleware as means for improving gameplay
Current commercial AI middleware are still far from being a generic and flexible tool for developing computer games. Also the literature lacks proposals in this field. In this w...
Börje Karlsson, Bruno Feijó