Sciweavers

2237 search results - page 382 / 448
» Storing information with extractors
Sort
View
CHI
2008
ACM
14 years 10 months ago
Blindsight: eyes-free access to mobile phones
Many mobile phones integrate services such as personal calendars. Given the social nature of the stored data, however, users often need to access such information as part of a pho...
Kevin A. Li, Patrick Baudisch, Ken Hinckley
CHI
2007
ACM
14 years 10 months ago
Shallow-depth 3d interaction: design and evaluation of one-, two- and three-touch techniques
On traditional tables, people frequently use the third dimension to pile, sort and store objects. However, while effective and informative for organization, this use of the third ...
Mark S. Hancock, M. Sheelagh T. Carpendale, Andy C...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
14 years 10 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah
VLDB
2008
ACM
110views Database» more  VLDB 2008»
14 years 10 months ago
Enhancing histograms by tree-like bucket indices
Histograms are used to summarize the contents of relations into a number of buckets for the estimation of query result sizes. Several techniques (e.g., MaxDiff and V-Optimal) have ...
Francesco Buccafurri, Gianluca Lax, Domenico SaccÃ...
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 10 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...