Sciweavers

161 search results - page 26 / 33
» Using clustering strategies for creating authority files
Sort
View
CHI
2010
ACM
15 years 4 months ago
Deception and magic in collaborative interaction
We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
Joe Marshall, Steve Benford, Tony P. Pridmore
TEI
2010
ACM
156views Hardware» more  TEI 2010»
15 years 4 months ago
Captain electric and battery boy: prototypes for wearable power-generating artifacts
“Captain Electric and Battery Boy” refers to an ongoing research project that aims to develop electronic garments and wearable artifacts that harness power from the body and u...
Joanna Berzowska, Marc Beaulieu, Vincent Leclerc, ...
CHI
2009
ACM
15 years 4 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
TSMC
1998
93views more  TSMC 1998»
14 years 9 months ago
Toward a completely automatic neural-network-based human chromosome analysis
Abstract—The application of neural networks (NN’s) to automatic analysis of chromosome images is investigated in this paper. All aspects of the analysis, namely segmentation, f...
Boaz Lerner
BMCBI
2008
118views more  BMCBI 2008»
14 years 9 months ago
PseudoGeneQuest - Service for identification of different pseudogene types in the human genome
Background: Pseudogenes, nonfunctional copies of genes, evolve fast due the lack of evolutionary pressures and thus appear in several different forms. PseudoGeneQuest is an online...
Csaba P. Ortutay, Mauno Vihinen