Sciweavers

2564 search results - page 406 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CASSIS
2005
Springer
14 years 1 months ago
The Design of Application-Tailorable Operating System Product Lines
System software for deeply embedded devices has to cope with a broad variety of requirements and platforms, but especially with strict resource constraints. To compete against prop...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...
ISWC
2002
IEEE
14 years 1 months ago
Retinal Displays
Currently available screen and retinal head mounted displays have insufficient field of view to fully exploit many virtual and augmented reality applications. Screen based display...
Thomas A. Furness III
HUC
2009
Springer
14 years 23 days ago
A Long-Duration Study of User-Trained 802.11 Localization
We present an indoor wireless localization system that is capable of room-level localization based solely on 802.11 network signal strengths and usersupplied training data. Our sys...
Andrew Barry, Benjamin Fisher, Mark L. Chang
CMC
1998
Springer
14 years 12 days ago
Multimodal Reference to Objects: An Empirical Approach
Abstract. In this chapter we report on an investigation into the principles underlying the choice of a particular referential expression to refer to an object located in a domain t...
Robbert-Jan Beun, Anita H. M. Cremers
CHI
1997
ACM
14 years 10 days ago
Queries? Links? Is there a Difference?
Hypertext interfaces are considered appropriate for information exploration tasks. The prohibitively expensive link creation effort, however, prevents traditional hypertext interf...
Gene Golovchinsky