Sciweavers

482 search results - page 63 / 97
» Getting Personal with Computers: How to Design Personalities...
Sort
View
CIKM
2011
Springer
12 years 7 months ago
Exploiting longer cycles for link prediction in signed networks
We consider the problem of link prediction in signed networks. Such networks arise on the web in a variety of ways when users can implicitly or explicitly tag their relationship w...
Kai-Yang Chiang, Nagarajan Natarajan, Ambuj Tewari...
MM
2006
ACM
151views Multimedia» more  MM 2006»
14 years 1 months ago
Choreographic buttons: promoting social interaction through human movement and clear affordances
We used human movement as the basis for designing a collaborative aesthetic design environment. Our intention was to promote social interaction and creative expression. We employe...
Andrew Webb, Andruid Kerne, Eunyee Koh, Pranesh Jo...
ATAL
2007
Springer
14 years 1 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
ASSETS
2005
ACM
13 years 9 months ago
Toward Goldilocks' pointing device: determining a "just right" gain setting for users with physical impairments
We designed and evaluated an agent that recommends a pointing device gain for a given user, with mixed success. 12 participants with physical impairments used the Input Device Age...
Heidi Horstmann Koester, Edmund F. LoPresti, Richa...
MOBIHOC
2005
ACM
14 years 7 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning