Sciweavers

2399 search results - page 348 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2004
ACM
14 years 8 months ago
Unintended effects: varying icon spacing changes users' visual search strategy
Users of modern GUIs routinely engage in visual searches for various control items, such as buttons and icons. Because this is so ubiquitous, it is important that the visual prope...
Sarah P. Everett, Michael D. Byrne
CHI
1997
ACM
14 years 14 days ago
The Amulet User Interface Development Environment
—The Amulet user interface development environment makes it easier for programmers to create highly-interactive, graphical user interface software for Unix, Windows and the Macin...
Brad A. Myers, Richard G. McDaniel, Robert C. Mill...
ICPR
2006
IEEE
14 years 9 months ago
Multiple Object Tracking Using Local PCA
Tracking multiple interacting objects represents a challenging area in computer vision. The tracking problem in general can be formulated as the task of recovering the spatio-temp...
Bernhard Frühstück, Csaba Beleznai, Hors...
ICPR
2000
IEEE
14 years 9 months ago
A Weighted Distance Approach to Relevance Feedback
Content-based image retrievalsystems use low-levelfeatures like color and texturefor image representation. Given these representationsasfeature vectors, similarity between images ...
Selim Aksoy, Robert M. Haralick, Faouzi Alaya Chei...
SIGCSE
2009
ACM
114views Education» more  SIGCSE 2009»
14 years 8 months ago
Engaging students through mobile game development
This paper describes using mobile game development as a motivational tool to engage students early in the curriculum. Mobile devices have become an integral part of everyday lives...
Stan Kurkovsky