Sciweavers

3149 search results - page 175 / 630
» Users in Context
Sort
View
KBSE
2005
IEEE
15 years 9 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
131
Voted
WIS
2004
15 years 5 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
143
Voted
WWW
2010
ACM
15 years 10 months ago
Earthquake shakes Twitter users: real-time event detection by social sensors
Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occ...
Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo
143
Voted
CHI
2001
ACM
16 years 4 months ago
Responding to subtle, fleeting changes in the user's internal state
In human-to-human interaction, people sometimes are able to pick up and respond sensitively to the other's internal state as it shifts moment by moment over the course of an ...
Wataru Tsukahara, Nigel Ward
136
Voted
ICMI
2005
Springer
164views Biometrics» more  ICMI 2005»
15 years 9 months ago
A user interface framework for multimodal VR interactions
This article presents a User Interface (UI) framework for multimodal interactions targeted at immersive virtual environments. Its configurable input and gesture processing compon...
Marc Erich Latoschik