Sciweavers

SIGGRAPH
2010
ACM
13 years 10 months ago
Apparent layer operations for the manipulation of deformable objects
We introduce layer operations for single-view 3D deformable object manipulation, in which the user can control the depth order of layered 3D objects resting on a flat ground with...
Takeo Igarashi, Jun Mitani
IBPRIA
2009
Springer
13 years 11 months ago
Face-to-Face Social Activity Detection Using Data Collected with a Wearable Device
In this work the feasibility of building a socially aware badge that learns from user activities is explored. A wearable multisensor device has been prototyped for collecting data ...
Pierluigi Casale, Oriol Pujol, Petia Radeva
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
13 years 11 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi
UIST
2009
ACM
13 years 11 months ago
SemFeel: a user interface with semantic tactile feedback for mobile touch-screen devices
One of the challenges with using mobile touch-screen devices is that they do not provide tactile feedback to the user. Thus, the user is required to look at the screen to interact...
Koji Yatani, Khai N. Truong
VL
2002
IEEE
13 years 11 months ago
A Visual Query Language for Software Visualization
Visualization for software understanding requires that the user be able to define specific visualizations that are specialized to the particular understanding task at hand. In t...
Steven P. Reiss
LCN
2002
IEEE
13 years 11 months ago
A New Location Management Strategy Based on User Mobility Pattern for Wireless Networks
For a wireless network to effectively deliver services to the mobile users, it must have an efficient way to track them. The location management fulfills this task through locat...
Wenchao Ma, Yuguang Fang
HICSS
2002
IEEE
191views Biometrics» more  HICSS 2002»
13 years 11 months ago
Mindmap: Utilizing Multiple Taxonomies and Visualization to Understand a Document Collection
We present a novel system and methodology for browsing and exploring topics and concepts within a document collection. The process begins with the generation of multiple taxonomie...
W. Scott Spangler, Jeffrey T. Kreulen, Justin Less...
DSN
2002
IEEE
13 years 11 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
EUROCAST
2003
Springer
154views Hardware» more  EUROCAST 2003»
13 years 11 months ago
Personalized Guided Routes in an Adaptive Evolutionary Hypermedia System
In this paper we describe an adaptation method for adaptive hypermedia systems, consisting in personalized guided routes for the SEM-HP model. SEM-HP is a layered, systemic, semant...
Nuria Medina-Medina, Fernando Molina-Ortiz, Lina G...
CIKM
2003
Springer
13 years 11 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...