We present the results of a field study of some of the work practices and software used by dentists. We also present the design, implementation, and evaluation of a user interface...
Michael F. Marotta, Purin Phanichphant, Patrick Ma...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
In the absence of manual organization of large digital photo collections, the photos' visual content and creation dates can help support time-based visual search tasks. Curre...
David Huynh, Steven M. Drucker, Patrick Baudisch, ...
Abstract. Through recent developments in the segment of mobile devices like personal digital assistants (PDA) the usage of mobile applications in different areas of our normal lif...
Lighting design in computer graphics is essentially not a random process but one driven by both a technical and aesthetic appreciation of lighting. In some applications, the result...
Hai Nam Ha, Christophe Lino, Marc Christie, Patric...