Sciweavers

2399 search results - page 365 / 480
» On Authentication between Human and Computer
Sort
View
ISM
2005
IEEE
112views Multimedia» more  ISM 2005»
14 years 1 months ago
Automatically Generating User Interfaces for Device Federations
One of the ideas of ubiquitous computing is that computing resources should be embedded ubiquitously in the environment, making them available to any nearby users. Some researcher...
Elmar Braun, Max Mühlhäuser
WORDS
2005
IEEE
14 years 1 months ago
Towards Self-Healing Systems via Dependable Architecture and
Self-healing systems focus on how to reducing the complexity and cost of the management of dependability policies and mechanisms without human intervention. This position paper pr...
Hong Mei, Gang Huang, Wei-Tek Tsai
MM
2005
ACM
123views Multimedia» more  MM 2005»
14 years 1 months ago
How speech/text alignment benefits web-based learning
This demonstration presents an integrated web-based synchronized scenario for many-to-one cross-media correlations between speech (an EFL, English as Foreign Language, lecture wit...
Sheng-Wei Li, Hao-Tung Lin, Herng-Yow Chen
RT
2005
Springer
14 years 1 months ago
Real Illumination from Virtual Environments
We introduce a method for actively controlling the illumination in a room so that it is consistent with a virtual world. In combination with a high dynamic range display, the syst...
Abhijeet Ghosh, Matthew Trentacoste, Helge Seetzen...
NORDICHI
2004
ACM
14 years 1 months ago
Six modes of proactive resource management: a user-centric typology for proactive behaviors
Proactivity has recently arisen as one of the focus areas within HCI. Proactive systems adhere to two premises: 1) working on behalf of, or pro, the user, and 2) acting on their o...
Antti Salovaara, Antti Oulasvirta