Sciweavers

169 search results - page 26 / 34
» Malicious interface design: exploiting the user
Sort
View
COMCOM
2008
74views more  COMCOM 2008»
13 years 7 months ago
The PoSIM middleware for translucent and context-aware integrated management of heterogeneous positioning systems
The widespread availability of devices with multiple wireless interfaces and the abundance of heterogeneous positioning techniques open new market potentials for Location Based Se...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
CHI
2006
ACM
14 years 8 months ago
Chick clique: persuasive technology to motivate teenage girls to exercise
We are developing a preventative health cell phone application that helps motivate teenage girls to exercise by exploiting their social desire to stay connected with their peers. ...
Tammy Toscos, Anne M. Faber, Shunying An, Mona Pra...
CGO
2009
IEEE
14 years 2 months ago
Fast Track: A Software System for Speculative Program Optimization
—Fast track is a software speculation system that enables unsafe optimization of sequential code. It speculatively runs optimized code to improve performance and then checks the ...
Kirk Kelsey, Tongxin Bai, Chen Ding, Chengliang Zh...
ICAT
2003
IEEE
14 years 27 days ago
ARKB: 3D vision-based Augmented Reality Keyboard
In this paper, we propose a wearable 3D Augmented Reality Keyboard (ARKB) which enables a user to type text or control CG objects without using conventional interfaces, such as ke...
Minkyung Lee, Woontack Woo
JCDL
2009
ACM
130views Education» more  JCDL 2009»
14 years 2 months ago
Whetting the appetite of scientists: producing summaries tailored to the citation context
The amount of scientific material available electronically is forever increasing. This makes reading the published literature, whether to stay up-to-date on a topic or to get up ...
Stephen Wan, Cécile Paris, Robert Dale