Sciweavers

4273 search results - page 734 / 855
» Improving proactive information systems
Sort
View
AFRIGRAPH
2003
ACM
15 years 8 months ago
Psychophysically based artistic techniques for increased perceived realism of virtual environments
The perceived realism of a computer generated image depends on the accuracy of the modeling and illumination calculations, the limitations of the display device, and the way in wh...
Peter Longhurst, Patrick Ledda, Alan Chalmers
126
Voted
IUI
2003
ACM
15 years 8 months ago
Abbreviated text input
We address the problem of improving the efficiency of natural language text input under degraded conditions (for instance, on PDAs or cell phones or by disabled users) by taking a...
Stuart M. Shieber, Ellie Baker
MOBIDE
2003
ACM
15 years 8 months ago
TiNA: a scheme for temporal coherency-aware in-network aggregation
This paper presents TiNA, a scheme for minimizing energy consumption in sensor networks by exploiting end-user tolerance to temporal coherency. TiNA utilizes temporal coherency to...
Mohamed A. Sharaf, Jonathan Beaver, Alexandros Lab...
127
Voted
SIGIR
2003
ACM
15 years 8 months ago
Distributed Web Search as a Stochastic Game
Distributed search systems are an emerging phenomenon in Web search, in which independent topic-specific search engines provide search services, and metasearchers distribute user...
Rinat Khoussainov, Nicholas Kushmerick
136
Voted
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 8 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie