Sciweavers

9310 search results - page 1692 / 1862
» User interface continuations
Sort
View
CHI
2008
ACM
15 years 3 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
106
Voted
ASSETS
2005
ACM
15 years 3 months ago
Visualizing non-speech sounds for the deaf
Sounds constantly occur around us, keeping us aware of our surroundings. People who are deaf have difficulty maintaining an awareness of these ambient sounds. We present an invest...
Tara Matthews, Janette Fong, Jennifer Mankoff
ASWC
2006
Springer
15 years 3 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
CANDC
2005
ACM
15 years 3 months ago
The homespun museum: computers, fabrication, and the design of personalized exhibits
The traditional view of the “home computer” is as a selfcontained appliance: computation, on this view, is something that takes place within a desktop box, and that produces i...
Michael Eisenberg, Nwanua Elumeze, Leah Buechley, ...
CCGRID
2005
IEEE
15 years 3 months ago
The Composite Endpoint Protocol (CEP): scalable endpoints for terabit flows
We introduce the Composite Endpoint Protocol (CEP) which efficiently composes a set of transmission elements to support high speed flows which exceed the capabilities of a single...
Eric Weigle, Andrew A. Chien
« Prev « First page 1692 / 1862 Last » Next »