Sciweavers

12052 search results - page 1980 / 2411
» computing 2010
Sort
View
IEEEARES
2010
IEEE
15 years 11 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
ISPASS
2010
IEEE
15 years 11 months ago
Hardware prediction of OS run-length for fine-grained resource customization
—In the past ten years, computer architecture has seen a paradigm shift from emphasizing single thread performance to energy efficient, throughput oriented, chip multiprocessors...
David Nellans, Kshitij Sudan, Rajeev Balasubramoni...
CSCW
2010
ACM
15 years 11 months ago
Receptionist or information kiosk: how do people talk with a robot?
The schema or mental structures that people apply towards other people has been shown to influence the way people cooperate with others. Schemas evoke behavioral scripts. In this ...
Min Kyung Lee, Sara B. Kiesler, Jodi Forlizzi
ETRA
2010
ACM
169views Biometrics» more  ETRA 2010»
15 years 11 months ago
Eye and pointer coordination in search and selection tasks
Selecting a graphical item by pointing with a computer mouse is a ubiquitous task in many graphical user interfaces. Several techniques have been suggested to facilitate this task...
Hans-Joachim Bieg, Lewis L. Chuang, Roland W. Flem...
HRI
2010
ACM
15 years 11 months ago
Investigating multimodal real-time patterns of joint attention in an hri word learning task
Abstract—Joint attention – the idea that humans make inferences from observable behaviors of other humans by attending to the objects and events that these others humans attend...
Chen Yu, Matthias Scheutz, Paul W. Schermerhorn
« Prev « First page 1980 / 2411 Last » Next »