Sciweavers

315 search results - page 36 / 63
» User strategies for handling information tasks in webcasts
Sort
View
CHI
2009
ACM
15 years 4 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
AAAI
2000
14 years 11 months ago
Human-Guided Simple Search
Scheduling, routing, and layout tasks are examples of hard operations-research problems that have broad application in industry. Typical algorithms for these problems combine some...
David Anderson, Emily Anderson, Neal Lesh, Joe Mar...
IUI
2012
ACM
13 years 5 months ago
Style by demonstration: teaching interactive movement style to robots
The style in which a robot moves, expressed through its gait or locomotion, can convey effective messages to people. For example, a robot could move aggressively in reaction to a ...
James Everett Young, Kentaro Ishii, Takeo Igarashi...
77
Voted
BMCBI
2010
137views more  BMCBI 2010»
14 years 9 months ago
Biana: a software framework for compiling biological interactions and analyzing networks
Background: The analysis and usage of biological data is hindered by the spread of information across multiple repositories and the difficulties posed by different nomenclature sy...
Javier Garcia-Garcia, Emre Guney, Ramon Aragues, J...
DOLAP
1999
ACM
15 years 1 months ago
starER: A Conceptual Model for Data Warehouse Design
Modeling data warehouses is a complex task focusing, very often, into internal structures and implementation issues. In this paper we argue that, in order to accurately reflect the...
Nectaria Tryfona, Frank Busborg, Jens G. Borch Chr...