Sciweavers

1211 search results - page 187 / 243
» Computing Manipulations of Ranking Systems
Sort
View
CHI
2005
ACM
14 years 8 months ago
PINS push in and POUTS pop out: creating a tangible pin-board that ejects physical documents
There is an asymmetry in many tangible interfaces: while phicons can be used to manipulate digital information, the reverse is often not possible ? the digital world cannot push b...
Kher Hui Ng, Steve Benford, Boriana Koleva
CHI
2005
ACM
14 years 8 months ago
The domestic economy: a broader unit of analysis for end user programming
Domestic ubicomp applications often assume individual users will program and configure their technology in isolation, decoupled from complex domestic environments in which they ar...
Jennifer A. Rode, Eleanor F. Toye, Alan F. Blackwe...
ACHI
2008
IEEE
14 years 2 months ago
NALP: Navigating Assistant for Large Display Presentation Using Laser Pointer
In this paper, we present NALP (Navigating Assistant using Laser Pointer), a novel interaction technique for large display presentation control. NALP is based on laser dot detecti...
Liang Zhang, Yuanchun Shi, Boliang Chen
COLCOM
2008
IEEE
14 years 2 months ago
The Data Interoperability Problem as an Exemplary Case Study in the Development of Software Collaboration Environments
The Data Interoperability Problem appears in contexts where consumers need to peruse data owned by producers, and the syntax and/or semantics of such data—at both end points—ar...
Arturo J. Sánchez-Ruíz, Karthikeyan ...
ICDCS
2006
IEEE
14 years 1 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...