Sciweavers

3303 search results - page 607 / 661
» Multidimensional Access Methods
Sort
View
CHI
2007
ACM
14 years 11 months ago
Speed sonic across the span: building a platform audio game
We describe the design process and initial user study of an audio game created for the visually impaired. Until the advent of 3D graphics games, platform games where the player ju...
Michael A. Oren
CHI
2004
ACM
14 years 11 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
POPL
2006
ACM
14 years 11 months ago
A virtual class calculus
Virtual classes are class-valued attributes of objects. Like virtual methods, virtual classes are defined in an object's class and may be redefined within subclasses. They re...
Erik Ernst, Klaus Ostermann, William R. Cook
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 11 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
VLDB
2008
ACM
147views Database» more  VLDB 2008»
14 years 11 months ago
Tree-based partition querying: a methodology for computing medoids in large spatial datasets
Besides traditional domains (e.g., resource allocation, data mining applications), algorithms for medoid computation and related problems will play an important role in numerous e...
Kyriakos Mouratidis, Dimitris Papadias, Spiros Pap...