Sciweavers

175 search results - page 17 / 35
» Getting Computers to See Information Graphics So Users Do No...
Sort
View
WISEC
2010
ACM
14 years 3 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
CHI
2008
ACM
14 years 8 months ago
Using tags to assist near-synchronous communication
In this work, we introduce the use of tags to support the near synchronous use of instant messaging (IM). As a proof-of-concept, we developed a plug-in in Lotus Sametime, an enter...
Gary Hsieh, Jennifer Lai, Scott E. Hudson, Robert ...
VISUALIZATION
2005
IEEE
14 years 1 months ago
The Value of Visualization
The field of Visualization is getting mature. Many problems have been solved, and new directions are sought for. In order to make good choices, an understanding of the purpose an...
Jarke J. van Wijk
ELPUB
2008
ACM
13 years 9 months ago
Open Access Citation Rates and Developing Countries
Academics, having written their peer reviewed articles, may at some stage in the make their work Open Access (OA). They can do this by self-archiving an electronic version of thei...
Michael Norris, Charles Oppenheim, Fytton Rowland
VISSYM
2004
13 years 9 months ago
Shape-Embedded-Histograms for Visual Data Mining
Scatterplots are widely used in exploratory data analysis and class visualization. The advantages of scatterplots are that they are easy to understand and allow the user to draw c...
Amihood Amir, Reuven Kashi, Daniel A. Keim, Nathan...