Sciweavers

2351 search results - page 333 / 471
» Tagging Human Knowledge
Sort
View
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICCHP
2004
Springer
15 years 3 months ago
proXimity: Ad-Hoc Networks for Enhanced Mobility
David tries not to use unfamiliar trains and buses, he doesn’t travel to places he doesn’t know, and he doesn’t travel in unusual environments without a companion. David is v...
Simon Harper, Stephen Pettitt, Carole A. Goble
ITS
2004
Springer
104views Multimedia» more  ITS 2004»
15 years 3 months ago
Student Question-Asking Patterns in an Intelligent Algebra Tutor
Cognitive Tutors are proven effective learning environments, but are still not as effective as one-on-one human tutoring. We describe an environment (ALPS) designed to engage stude...
Lisa Anthony, Albert T. Corbett, Angela Z. Wagner,...
CHI
2010
ACM
15 years 3 months ago
Occlusion-aware interfaces
We define occlusion-aware interfaces as interaction techniques which know what area of the display is currently occluded, and use this knowledge to counteract potential problems a...
Daniel Vogel, Ravin Balakrishnan
PG
2003
IEEE
15 years 3 months ago
Motion Perturbation Based on Simple Neuromotor Control Models
Motion capture is widely used for character animation. One of the major challenges of this technique is how to modify the captured motion in plausible ways. Previous work has focu...
KangKang Yin, Michael B. Cline, Dinesh K. Pai