Sciweavers

9310 search results - page 1694 / 1862
» User interface continuations
Sort
View
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 3 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
CSCW
2008
ACM
15 years 3 months ago
The microstructures of social tagging: a rational model
This article presents a rational model developed under the distributed cognition framework that explains how social tags influence knowledge acquisition and adaptation in explorat...
Wai-Tat Fu
CSCW
2008
ACM
15 years 3 months ago
Collaboration and interference: awareness with mice or touch input
Multi-touch surfaces are becoming increasingly popular. An assumed benefit is that they can facilitate collaborative interactions in co-located groups. In particular, being able t...
Eva Hornecker, Paul Marshall, Nick Sheep Dalton, Y...
CSCW
2008
ACM
15 years 3 months ago
Are you sleeping?: sharing portrayed sleeping status within a social network
Within a group of peers, it is often useful or interesting to know whether someone in the group has gone to bed or whether they have awakened in the morning. This information, nat...
Sunyoung Kim, Julie A. Kientz, Shwetak N. Patel, G...
DCAI
2008
15 years 3 months ago
The Intelligent Butler: A Virtual Agent for Disabled and Elderly People Assistance
Abstract. Social assistance constitutes an increasing problem in developed countries, which can be considered from two dimensions: the home and the hospital frameworks. Anyway, mos...
Gabriel Fiol-Roig, Diana Arellano, Francisco J. Pe...
« Prev « First page 1694 / 1862 Last » Next »