Sciweavers

3693 search results - page 207 / 739
» User experience over time
Sort
View
SOUPS
2009
ACM
15 years 6 months ago
Analyzing use of privacy policy attributes in a location sharing application
Privacy in location sharing applications is particularly important due to the sensitivity of users’ geographical location. Privacy in most location sharing applications is provi...
Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cr...
ESCIENCE
2005
IEEE
15 years 5 months ago
Panoply of Utilities in Taverna
The Taverna e-Science Workbench is a central component of myGrid, a loosely coupled suite of middleware services designed to support in silico experiments in biology. Taverna enab...
Katy Wolstencroft, Thomas M. Oinn, Carole A. Goble...
INFOCOM
2003
IEEE
15 years 5 months ago
Evaluation of an Adaptive Transport Protocol
—Applications on mobile computers must adapt to high variability in wireless network performance. Extending the semantics of transport protocols to offer more control over commun...
Benjamin Atkin, Kenneth P. Birman
CHI
2009
ACM
15 years 4 months ago
Disambiguating ninja cursors with eye gaze
Ninja cursors aim to speed up target selection on large or multiple monitors. Several cursors are displayed on the screen with one of them selected as the active cursor. Eye track...
Kari-Jouko Räihä, Oleg Spakov
SBBD
2007
126views Database» more  SBBD 2007»
15 years 1 months ago
Constraint-based Tree Pattern Mining
Abstract. A lot of recent applications dealing with complex data require sophisticated data structures (trees or graphs) for their specification. Recently, several techniques for ...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...