Sciweavers

1759 search results - page 273 / 352
» Using term informativeness for named entity detection
Sort
View
CHI
2005
ACM
15 years 10 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
IUI
2010
ACM
15 years 6 months ago
Rush: repeated recommendations on mobile devices
We present rush as a recommendation-based interaction and visualization technique for repeated item selection from large data sets on mobile touch screen devices. Proposals and ch...
Dominikus Baur, Sebastian Boring, Andreas Butz
CSCW
2010
ACM
15 years 6 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
SAC
2010
ACM
15 years 4 months ago
Mining temporal relationships among categories
Temporal text mining deals with discovering temporal patterns in text over a period of time. A Theme Evolution Graph (TEG) is used to visualize when new themes are created and how...
Saket S. R. Mengle, Nazli Goharian
HRI
2009
ACM
15 years 4 months ago
CALLY: the cell-phone robot with affective expressions
This poster describes a robot cell-phone named CALLY with which we are exploring the roles of facial and gestural expressions of robotic products in the human computer interaction...
Ji-Dong Yim, Christopher D. Shaw