Sciweavers

1139 search results - page 182 / 228
» Boosting strategy for classification
Sort
View
TEI
2010
ACM
172views Hardware» more  TEI 2010»
14 years 2 months ago
FlexiKnobs: bridging the gap between mouse interaction and hardware controllers
Parameters in audio or video editing applications can mostly be controlled by a variety of hardware devices such as MIDI controllers. These, however, usually feature only a limite...
Kristian Gohlke, Michael Hlatky, Sebastian Heise, ...
TEI
2010
ACM
134views Hardware» more  TEI 2010»
14 years 2 months ago
Liquids, smoke, and soap bubbles: reflections on materials for ephemeral user interfaces
In this paper we inquire material qualities for tangible user interfaces and introduce the term “ephemeral user interface”. We present an example user interface that employs f...
Axel Sylvester, Tanja Döring, Albrecht Schmid...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CHI
2009
ACM
14 years 2 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
CHI
2009
ACM
14 years 2 months ago
Gaze-controlled driving
We investigate if the gaze (point of regard) can control a remote vehicle driving on a racing track. Five different input devices (on-screen buttons, mousepointing low-cost webcam...
Martin Tall, Alexandre Alapetite, Javier San Agust...