Sciweavers

8623 search results - page 1532 / 1725
» Software engineering for secure systems
Sort
View
AUIC
2006
IEEE
14 years 3 months ago
Implementing a natural user interface for camera phones using visual tags
Pointing is a natural way of communicating. Children in all cultures use pointing inherently. Attaching tags to our environment enables interaction by pointing. Visual tags are a g...
Sanni Siltanen, Jouko Hyväkkä
IUI
2006
ACM
14 years 3 months ago
Automatically classifying emails into activities
Email-based activity management systems promise to give users better tools for managing increasing volumes of email, by organizing email according to a user’s activities. Curren...
Mark Dredze, Tessa A. Lau, Nicholas Kushmerick
IUI
2006
ACM
14 years 3 months ago
Linking messages and form requests
Large organizations with sophisticated infrastructures have large form-based systems that manage the interaction between the user community and the infrastructure. In many cases, ...
Anthony Tomasic, John Zimmerman, Isaac Simmons
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
14 years 3 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
IUI
2005
ACM
14 years 3 months ago
How to wreck a nice beach you sing calm incense
A principal problem in speech recognition is distinguishing between words and phrases that sound similar but have different meanings. Speech recognition programs produce a list of...
Henry Lieberman, Alexander Faaborg, Waseem Daher, ...
« Prev « First page 1532 / 1725 Last » Next »