Sciweavers

2927 search results - page 575 / 586
» Secure Distributed Human Computation
Sort
View
ASSETS
2006
ACM
14 years 1 months ago
The vocal joystick: : evaluation of voice-based cursor control techniques
Mouse control has become a crucial aspect of many modern day computer interactions. This poses a challenge for individuals with motor impairments or those whose use of hands are r...
Susumu Harada, James A. Landay, Jonathan Malkin, X...
PAM
2004
Springer
14 years 1 months ago
Measurements and Laboratory Simulations of the Upper DNS Hierarchy
Given that the global DNS system, especially at the higher root and top-levels, experiences significant query loads, we seek to answer the following questions: (1) How does the ch...
Duane Wessels, Marina Fomenkov, Nevil Brownlee, Ki...
GROUP
2003
ACM
14 years 1 months ago
Technology for boundaries
This paper presents a study of an organisation, which is undergoing a process transforming organisational and technological boundaries. In particular, we shall look at three kinds...
Susanne Bødker, Jannie Friis Kristensen, Ch...
SIGCSE
2000
ACM
453views Education» more  SIGCSE 2000»
14 years 5 days ago
Aristotle and object-oriented programming: why modern students need traditional logic
Classifying is a central activity in object-oriented programming and distinguishes it from procedural programming. Traditional logic, initiated by Aristotle, assigns classificatio...
Derek Rayside, Gerard T. Campbell
SIGIR
2010
ACM
13 years 11 months ago
Effective music tagging through advanced statistical modeling
Music information retrieval (MIR) holds great promise as a technology for managing large music archives. One of the key components of MIR that has been actively researched into is...
Jialie Shen, Wang Meng, Shuichang Yan, HweeHwa Pan...