Sciweavers

129 search results - page 10 / 26
» User- and job-centric monitoring: Analysing and presenting l...
Sort
View
CHI
2003
ACM
14 years 8 months ago
Information voyeurism: social impact of physically large displays on information privacy
A common observation when working on physically large displays, such as wall-sized projection, is that a certain amount of information privacy is lost. A common explanation for th...
Desney S. Tan, Mary Czerwinski
IJMHCI
2010
126views more  IJMHCI 2010»
13 years 5 months ago
Cocktail: Exploiting Bartenders' Gestures for Mobile Interaction
Recent mobile devices are capable of creating and storing a large amount of multimedia data, but sharing those data with others is still challenging. This paper presents Cocktail,...
Jong-Woon Yoo, Woomin Hwang, Hyunchul Seok, Sung K...
ASUNAM
2011
IEEE
12 years 7 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
ICALT
2007
IEEE
13 years 9 months ago
An Evaluation of Automatic Text Categorization in Online Discussion Analysis
Content analysis is often employed by teachers and research to analyse online discussion forums to serve various purposes such as assessment, evaluation, and educational research....
Andrew Kwok-Fai Lui, Siu Cheung Li, Sheung-On Choy
ACSAC
1998
IEEE
13 years 12 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer