Sciweavers

3377 search results - page 653 / 676
» Describing differences between databases
Sort
View
UIST
2004
ACM
14 years 1 months ago
Clip, connect, clone: combining application elements to build custom interfaces for information access
Many applications provide a form-like interface for requesting information: the user fills in some fields, submits the form, and the application presents corresponding results. ...
Jun Fujima, Aran Lunzer, Kasper Hornbæk, Yuz...
ICCHP
2004
Springer
14 years 1 months ago
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children
: Multimedia and Hypermedia technologies can be successfully used in education and rehabilitation for cognitively disabled persons. In particular, storytelling has always proved su...
Thimoty Barbieri, Antonio Bianchi, Licia Sbattella
RAID
2004
Springer
14 years 29 days ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 27 days ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
CBMS
2003
IEEE
14 years 27 days ago
A Clinical Report Management System Based upon the DICOM Structured Report Standard
Nowadays, several health institutions already use clinical report systems. However the majority of these systems do not comply with any standard for codification, storage and tran...
Mariana Kessler Bortoluzzi, Aldo von Wangenheim, K...