Sciweavers

557 search results - page 63 / 112
» From User Requirements to Tasks Descriptions in Real-Time Sy...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
HCI
1993
13 years 8 months ago
Reducing Repetition in Graphical Editing
People producing illustrations with graphical editors often need to repeat the same steps over and over again. This paper describes five techniques that reduce the amount of repet...
David Kurlander
ESWS
2010
Springer
13 years 10 months ago
Efficient Semantic-Aware Detection of Near Duplicate Resources
Abstract. Efficiently detecting near duplicate resources is an important task when integrating information from various sources and applications. Once detected, near duplicate reso...
Ekaterini Ioannou, Odysseas Papapetrou, Dimitrios ...
VISUAL
2007
Springer
14 years 1 months ago
A Knowledge Synthesizing Approach for Classification of Visual Information
Abstract. An approach for visual information analysis and classification is presented. It is based on a knowledge synthesizing technique to automatically create a relevance map fro...
Le Dong, Ebroul Izquierdo
ICMI
2004
Springer
162views Biometrics» more  ICMI 2004»
14 years 24 days ago
When do we interact multimodally?: cognitive load and multimodal communication patterns
Mobile usage patterns often entail high and fluctuating levels of difficulty as well as dual tasking. One major theme explored in this research is whether a flexible multimodal in...
Sharon L. Oviatt, Rachel Coulston, Rebecca Lunsfor...