Sciweavers

758 search results - page 82 / 152
» User Control over User Adaptation: A Case Study
Sort
View
CHI
2004
ACM
16 years 4 months ago
Finding meaningful uses for context-aware technologies: the humanistic research strategy
Human?computer interaction (HCI) is undergoing a paradigm change towards interaction that is contextually adapted to rich use situations taking place "beyond the desktop"...
Antti Oulasvirta
134
Voted
LCN
2005
IEEE
15 years 9 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
116
Voted
IRI
2008
IEEE
15 years 10 months ago
FACT: A fusion architecture with contract templates for semantic and syntactic integration
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users s...
Rose F. Gamble, Robert Baird, Leigh Flagg, Melody ...
CIKM
2010
Springer
15 years 2 months ago
FacetCube: a framework of incorporating prior knowledge into non-negative tensor factorization
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
Yun Chi, Shenghuo Zhu
CSCW
1994
ACM
15 years 7 months ago
From Implementation to Design: Tailoring and the Emergence of Systematization in CSCW
In this paper, we look at how people working in a governmental labor inspection agency tailor their shared PC environment. Starting with standard off-the-shelf software, the tailo...
Randall H. Trigg, Susanne Bødker