Sciweavers

132 search results - page 21 / 27
» Let's Trust Users It is Their Search
Sort
View
UIST
2004
ACM
14 years 23 days ago
Clip, connect, clone: combining application elements to build custom interfaces for information access
Many applications provide a form-like interface for requesting information: the user fills in some fields, submits the form, and the application presents corresponding results. ...
Jun Fujima, Aran Lunzer, Kasper Hornbæk, Yuz...
EMO
2001
Springer
150views Optimization» more  EMO 2001»
13 years 12 months ago
On the Effects of Archiving, Elitism, and Density Based Selection in Evolutionary Multi-objective Optimization
This paper studies the influence of what are recognized as key issues in evolutionary multi-objective optimization: archiving (to keep track of the current non-dominated solutions...
Marco Laumanns, Eckart Zitzler, Lothar Thiele
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
ACSAC
2007
IEEE
14 years 1 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
GRAPHICSINTERFACE
2004
13 years 8 months ago
Interactive Image-Based Exploded View Diagrams
We present a system for creating interactive exploded view diagrams using 2D images as input. This imagebased approach enables us to directly support arbitrary rendering styles, e...
Wilmot Li, Maneesh Agrawala, David Salesin