Sciweavers

2399 search results - page 372 / 480
» On Authentication between Human and Computer
Sort
View
TCBB
2008
115views more  TCBB 2008»
13 years 8 months ago
Highly Scalable Genotype Phasing by Entropy Minimization
A Single Nucleotide Polymorphism (SNP) is a position in the genome at which two or more of the possible four nucleotides occur in a large percentage of the population. SNPs accoun...
Alexander Gusev, Ion I. Mandoiu, Bogdan Pasaniuc
CHI
2009
ACM
14 years 8 months ago
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving
We investigate how people adapt their strategy for interleaving multiple concurrent tasks to varying objectives. A study was conducted in which participants drove a simulated vehi...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
CHI
2009
ACM
14 years 8 months ago
Synchronized communication and coordinated views: qualitative data discovery for team game user studies
We present a tool for qualitative data discovery that aids researchers in analyzing synchronized log data with audio collected from multiple computers. The tool was originally dev...
William A. Hamilton, Zachary O. Toups, Andruid Ker...
CHI
2006
ACM
14 years 8 months ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
MM
2006
ACM
330views Multimedia» more  MM 2006»
14 years 2 months ago
Visual attention detection in video sequences using spatiotemporal cues
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Yun Zhai, Mubarak Shah