Sciweavers

903 search results - page 168 / 181
» Usability inspection methods
Sort
View
WISE
2005
Springer
15 years 3 months ago
A Web Recommendation Technique Based on Probabilistic Latent Semantic Analysis
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of clickstream data will lead to capture usag...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
SOUPS
2005
ACM
15 years 3 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 3 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
DIAGRAMS
2010
Springer
15 years 1 months ago
Drawing Area-Proportional Venn-3 Diagrams with Convex Polygons
Abstract. Area-proportional Venn diagrams are a popular way of visualizing the relationships between data sets, where the set intersections have a specified numerical value. In th...
Peter Rodgers, Jean Flower, Gem Stapleton, John Ho...
ICDAR
2007
IEEE
15 years 1 months ago
Iterated Document Content Classification
We report an improved methodology for training classifiers for document image content extraction, that is, the location and segmentation of regions containing handwriting, machine...
Chang An, Henry S. Baird, Pingping Xiu