Sciweavers

903 search results - page 111 / 181
» Usability inspection methods
Sort
View
CEC
2010
IEEE
14 years 11 months ago
Interactive interpolating crossover in grammatical evolution
Interactive interpolating crossover allows a user to quickly see a large number of individuals formed by interactively-controlled interpolation between two or more parents. We stud...
James McDermott, Michael O'Neill, Anthony Brabazon
140
Voted
GISCIENCE
2010
Springer
285views GIS» more  GISCIENCE 2010»
14 years 11 months ago
Visual Exploration of Eye Movement Data Using the Space-Time-Cube
Abstract. Eye movement recordings produce large quantities of spatiotemporal data, and are more and more frequently used as an aid to gain further insight into human thinking in us...
Xia Li, Arzu Çöltekin, Menno-Jan Kraak
78
Voted
ISW
2010
Springer
14 years 8 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...
ICASSP
2011
IEEE
14 years 1 months ago
Space-time adaptive processing for range-folded spread-Doppler radar clutter mitigation
This paper concerns the detection of radar targets masked by Doppler-spread surface backscatter from points beyond the radar’s maximum unambiguous range. Current methods for mit...
William W. Lee, Jeffrey L. Krolik
112
Voted
TMC
2012
13 years 19 days ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...