Sciweavers

2846 search results - page 49 / 570
» Not one click for security
Sort
View
UIST
2010
ACM
15 years 1 months ago
UIMarks: quick graphical interaction with specific targets
This paper reports on the design and evaluation of UIMarks, a system that lets users specify on-screen targets and associated actions by means of a graphical marking language. UIM...
Olivier Chapuis, Nicolas Roussel
124
Voted
HCI
2009
15 years 1 months ago
Estimating Productivity: Composite Operators for Keystroke Level Modeling
Task time is a measure of productivity in an interface. Keystroke Level Modeling (KLM) can predict experienced user task time to within 10 to 30% of actual times. One of the bigges...
Jeff Sauro
171
Voted
ICCV
2011
IEEE
14 years 4 months ago
Strong Supervision From Weak Annotation: Interactive Training of Deformable Part Models
We propose a framework for large scale learning and annotation of structured models. The system interleaves interactive labeling (where the current model is used to semiautomate t...
Steven Branson, Pietro Perona, Serge Belongie
137
Voted
ACISP
2008
Springer
15 years 10 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu
ISI
2007
Springer
15 years 3 months ago
Privacy Preserving Collaborative Data Mining
Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association rule mining, one of the core data...
Justin Z. Zhan