Sciweavers

173 search results - page 27 / 35
» Providing a Progressive Access to Awareness Information
Sort
View
JBI
2002
128views Bioinformatics» more  JBI 2002»
13 years 7 months ago
Rutabaga by any other name: extracting biological names
i As the pace of biological research accelerates, biologists are becoming increasingly reliant on computers to manage the information explosion. Biologists communicate their resea...
Lynette Hirschman, Alexander A. Morgan, Alexander ...
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 2 months ago
Rethinking the Digital Divide: Towards a Path of Digital Effectiveness
The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching fo...
Corlane Barclay, Evan W. Duggan
CHI
2009
ACM
14 years 8 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
EUROCRYPT
2004
Springer
14 years 29 days ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
MOBICOM
2004
ACM
14 years 1 months ago
Towards service and user discovery on wireless networks
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...