Sciweavers

8468 search results - page 1515 / 1694
» The Technology of Data Stashing
Sort
View
EICS
2009
ACM
15 years 5 months ago
Input evaluation of an eye-gaze-guided interface: Kalman filter vs. velocity threshold eye movement identification
This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman Filter (I-KF) eye movement detection models when employed for eye-gaze-guided inter...
Do Hyong Koh, Sandeep A. Munikrishne Gowda, Oleg V...
GROUP
2009
ACM
15 years 5 months ago
Information handover in time-critical work
Information transfer under time pressure and stress often leads to information loss. This paper studies the characteristics and problems of information handover from the emergency...
Aleksandra Sarcevic, Randall S. Burd
HT
2009
ACM
15 years 5 months ago
Cross-tagging for personalized open social networking
The Social Web is successfully established and poised for continued growth. Web 2.0 applications such as blogs, bookmarking, music, photo and video sharing systems are among the m...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl...
IMC
2009
ACM
15 years 5 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...
IMC
2009
ACM
15 years 5 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
« Prev « First page 1515 / 1694 Last » Next »