Sciweavers

6885 search results - page 1303 / 1377
» The micro-structure of use of help
Sort
View
IWSEC
2009
Springer
14 years 4 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
MHCI
2009
Springer
14 years 4 months ago
Tacticycle: a tactile display for supporting tourists on a bicycle trip
Cycling is a common leisure time sports in touristic regions. For us it was the question how tourists actually find their paths in the area and what kind of navigation aids might...
Benjamin Poppinga, Martin Pielot, Susanne Boll
NOSSDAV
2009
Springer
14 years 4 months ago
Web 2.0 traffic measurement: analysis on online map applications
In recent years, web based online map applications have been getting more and more popular, such as Google Maps, Yahoo Maps. Many new Web 2.0 techniques such as mash-up and AJAX w...
Song Lin, Zhiguo Gao, Ke Xu
UM
2009
Springer
14 years 4 months ago
Adaptive Clustering of Search Results
Clustering of search results has been shown to be advantageous over the simple list presentation of search results. However, in most clustering interfaces, the clusters are not ada...
Xuehua Shen, ChengXiang Zhai, Nicholas J. Belkin
APGV
2009
ACM
196views Visualization» more  APGV 2009»
14 years 4 months ago
Effects of animation, user-controlled interactions, and multiple static views in understanding 3D structures
Visualizations of 3D spatial structures use various techniques such as user controlled interactions or 2D projection views to convey the structure to users. Researchers have shown...
Taylor Sando, Melanie Tory, Pourang Irani
« Prev « First page 1303 / 1377 Last » Next »