Sciweavers

2564 search results - page 345 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
MHCI
2005
Springer
14 years 1 months ago
Mobile access to personal digital photograph archives
Handheld computing devices are becoming highly connected devices with high capacity storage. This has resulted in their being able to support storage of, and access to, personal p...
Cathal Gurrin, Gareth J. F. Jones, Hyowon Lee, Nei...
ACMACE
2009
ACM
14 years 10 days ago
Music box: composing and performing visual music
Music Box is an artistic implementation of emergent behavior and its use to create music. Music Box employs Craig Reynold's flocking algorithm to display animated notes that ...
Lindsay Grace
EICS
2009
ACM
14 years 1 months ago
Support for authoring service front-ends
The success of service-oriented computing has important implications on how people develop user interfaces. This paper discusses a method for supporting the development of interac...
Fabio Paternò, Carmen Santoro, Lucio Davide...
CHI
1997
ACM
14 years 15 days ago
Effective View Navigation
Searching for an item in a long ordered list is a frequent task when using any kind of computing device (from desktop PCs to mobile phones). This paper explores three different int...
George W. Furnas
STOC
2009
ACM
181views Algorithms» more  STOC 2009»
14 years 9 months ago
The detectability lemma and quantum gap amplification
The quantum analog of a constraint satisfaction problem is a sum of local Hamiltonians - each (term of the) Hamiltonian specifies a local constraint whose violation contributes to...
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. V...