Sciweavers

1949 search results - page 355 / 390
» Protective Interface Specifications
Sort
View
ICFP
2009
ACM
14 years 10 months ago
Causal commutative arrows and their optimization
re a popular form of abstract computation. Being more general than monads, they are more broadly applicable, and in parare a good abstraction for signal processing and dataflow co...
Hai Liu, Eric Cheng, Paul Hudak
CHI
2009
ACM
14 years 10 months ago
Two studies of opportunistic programming: interleaving web foraging, learning, and writing code
This paper investigates the role of online resources in problem solving. We look specifically at how programmers--an exemplar form of knowledge workers--opportunistically interlea...
Joel Brandt, Philip J. Guo, Joel Lewenstein, Mira ...
CHI
2009
ACM
14 years 10 months ago
soft(n): toward a somaesthetics of touch
This paper explores the concept of somaesthetics as an approach to the design of expressive interaction. This concept is exemplified through the design process of soft(n), an inte...
Thecla Schiphorst
CHI
2009
ACM
14 years 10 months ago
Coralog: use-aware visualization connecting human micro-activities to environmental change
This paper describes the goal, design approach and specification, and preliminary use test of a use-aware ambient media called Coralog. Coralog is a widget which detects the durat...
Tanyoung Kim, Hwajung Hong, Brian Magerko
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
14 years 10 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei