Sciweavers

603 search results - page 18 / 121
» Determining Accessibility Needs Through User Goals
Sort
View
IDEAL
2010
Springer
13 years 5 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ASSETS
2008
ACM
13 years 9 months ago
What's new?: making web page updates accessible
Web applications facilitated by technologies such as JavaScript, DHTML, AJAX, and Flash use a considerable amount of dynamic web content that is either inaccessible or unusable by...
Yevgen Borodin, Jeffrey P. Bigham, Rohit Raman, I....
SEMWEB
2010
Springer
13 years 5 months ago
Enabling Ontology-Based Access to Streaming Data Sources
The availability of streaming data sources is progressively increasing thanks to the development of ubiquitous data capturing technologies such as sensor networks. The heterogeneit...
Jean-Paul Calbimonte, Óscar Corcho, Alasdai...
IJACTAICIT
2010
146views more  IJACTAICIT 2010»
13 years 5 months ago
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
Using multimodality in a computing system is advantageous in the sense that it makes computing more accessible to a wide range of users including those with impairments. Our work ...
Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Belli...
AAAI
1998
13 years 9 months ago
Handling Inconsistency for Multi-Source Integration
The overwhelming amount of information sources now available through the internet has increased the need to combine or integrate the data retrieved from these sources in an intell...
Sheila Tejada, Craig A. Knoblock, Steven Minton