Sciweavers

2169 search results - page 378 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
14 years 3 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...
VR
2008
IEEE
128views Virtual Reality» more  VR 2008»
14 years 3 months ago
Showing Users the Way: Signs in Virtual Worlds
In this paper, we report the results of a pilot study designed to evaluate the impact of signs as navigation aids in virtual worlds. Test subjects were divided into three groups (...
Daniel C. Cliburn, Stacy Rilea
INFOCOM
2007
IEEE
14 years 3 months ago
Finding Self-Similarities in Opportunistic People Networks
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic net...
Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli...
TABLETOP
2007
IEEE
14 years 3 months ago
Examination of Text-Entry Methods for Tabletop Displays
Although text entry is a vital part of day-to-day computing familiar to most people, not much research has been done to enable text entry on large interactive tables. One might as...
Uta Hinrichs, Mark S. Hancock, M. Sheelagh T. Carp...
CIKM
2007
Springer
14 years 3 months ago
Developing learning strategies for topic-based summarization
Most up-to-date well-behaved topic-based summarization systems are built upon the extractive framework. They score the sentences based on the associated features by manually assig...
Ouyang You, Sujian Li, Wenjie Li