Sciweavers

12478 search results - page 2494 / 2496
» Secure Interaction Design
Sort
View
GRAPHICSINTERFACE
2011
12 years 11 months ago
Pop-up depth views for improving 3D target acquisition
We present the design and experimental evaluation of pop-up depth views, a novel interaction technique for aiding in the placement or positioning of a 3D cursor or object. Previou...
Guangyu Wang, Michael J. McGuffin, François...
INFOCOM
2011
IEEE
12 years 10 months ago
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs
—Body sensor networks (BSNs) have been developed for a set of performance-critical applications, including smart healthcare, assisted living, emergency response, athletic perform...
Zhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally,...
IPSN
2011
Springer
12 years 10 months ago
Localising speech, footsteps and other sounds using resource-constrained devices
While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and works...
Yukang Guo, Mike Hazas
JCC
2011
154views more  JCC 2011»
12 years 10 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
SIGMOD
2011
ACM
282views Database» more  SIGMOD 2011»
12 years 10 months ago
SkylineSearch: semantic ranking and result visualization for pubmed
Life sciences researchers perform scientific literature search as part of their daily activities. Many such searches are executed against PubMed, a central repository of life sci...
Julia Stoyanovich, Mayur Lodha, William Mee, Kenne...
« Prev « First page 2494 / 2496 Last » Next »