Sciweavers

1013 search results - page 137 / 203
» Real Time - Mach Timers: Exporting Time to the User
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 8 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
CHI
2008
ACM
14 years 8 months ago
AutoCardSorter: designing the information architecture of a web site using latent semantic analysis
In this paper, we describe an innovative tool that supports the design and evaluation of the information architecture of a Web site. The tool uses Latent Semantic Analysis and hie...
Christos Katsanos, Nikolaos K. Tselios, Nikolaos M...
CHI
2007
ACM
14 years 8 months ago
Transfer scenarios: grounding innovation with marginal practices
Transfer scenarios is a method developed to support the design of innovative interactive technology. Such a method should help the designer to come up with inventive ideas, and at...
Sara Ljungblad, Lars Erik Holmquist
CHI
2004
ACM
14 years 8 months ago
Performance of menu-augmented soft keyboards
We report results on the performance of the combination of soft keyboards and marking menus. A model of expert user performance indicated an 11 - 37% (depending on the keyboard la...
Poika Isokoski
CHI
2003
ACM
14 years 8 months ago
Lessons from the lighthouse: collaboration in a shared mixed reality system
Museums attract increasing numbers of online visitors along with their conventional physical visitors. This paper presents a study of a mixed reality system that allows web, virtu...
Barry Brown, Ian MacColl, Matthew Chalmers, Areti ...