Sciweavers

6884 search results - page 1343 / 1377
» The macro-structure of use of help
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Analyzing and evaluating query reformulation strategies in web search logs
Users frequently modify a previous search query in hope of retrieving better results. These modifications are called query reformulations or query refinements. Existing research h...
Jeff Huang, Efthimis N. Efthimiadis
ICIDS
2009
Springer
14 years 2 months ago
Say Anything: A Demonstration of Open Domain Interactive Digital Storytelling
Say Anything is a text-based interactive digital storytelling application that differs from other systems in its emphasis on the ability of users to create a narrative in any domai...
Reid Swanson, Andrew S. Gordon
ICMT
2009
Springer
14 years 2 months ago
A Simple Game-Theoretic Approach to Checkonly QVT Relations
Abstract. The QVT Relations (QVT-R) transformation language allows the definition of bidirectional model transformations, which are required in cases where a two (or more) models ...
Perdita Stevens
IWSEC
2009
Springer
14 years 2 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
MHCI
2009
Springer
14 years 2 months ago
Tacticycle: a tactile display for supporting tourists on a bicycle trip
Cycling is a common leisure time sports in touristic regions. For us it was the question how tourists actually find their paths in the area and what kind of navigation aids might...
Benjamin Poppinga, Martin Pielot, Susanne Boll
« Prev « First page 1343 / 1377 Last » Next »