Sciweavers

3169 search results - page 538 / 634
» A General Framework for Large Scale Systems Development
Sort
View
119
Voted
MHCI
2009
Springer
15 years 8 months ago
Minimizing mobile phone disruption via smart profile management
In this paper, we describe the Smart Profile Management application that was designed to help minimize mobile phone disruptions. The system does this by making phone profile chang...
Amnon Dekel, Dan Nacht, Scott Kirkpatrick
128
Voted
STACS
1997
Springer
15 years 7 months ago
Methods and Applications of (MAX, +) Linear Algebra
Exotic semirings such as the “(max, +) semiring” (R ∪ {−∞}, max, +), or the “tropical semiring” (N ∪ {+∞}, min, +), have been invented and reinvented many times s...
Stephane Gaubert, Max Plus
148
Voted
CHI
2011
ACM
14 years 7 months ago
Proxemic interactions in ubiquitous computing ecologies
An important challenge in ubiquitous computing (ubicomp) is to create techniques that allow people to seamlessly and naturally connect to and interact with the increasing number o...
Nicolai Marquardt
CHI
2006
ACM
16 years 4 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
123
Voted
ICASSP
2007
IEEE
15 years 10 months ago
Discriminating Two Types of Noise Sources using Cortical Representation and Dimension Reduction Technique
Content-based audio classification techniques have focused on classifying events that are both semantically and perceptually distinct (such as speech, music, environmental sounds...
Shiva Sundaram, Shrikanth Narayanan