Sciweavers

1587 search results - page 79 / 318
» What's my method
Sort
View
176
Voted
PDC
2004
ACM
15 years 10 months ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar
122
Voted
CHI
2009
ACM
16 years 5 months ago
Tangibles for children, : the challenges
A significant proportion of research in the field of tangible interaction involves children. A common aspiration is to offer benefits through tangibility, related to ease of use a...
Bieke Zaman, Vero Vanden Abeele, Panos Markopoulos...
JCP
2007
127views more  JCP 2007»
15 years 5 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
IR
2000
15 years 5 months ago
End-User Searching Challenges Indexing Practices in the Digital Newspaper Photo Archive
: Previous research in conceptual indexing methods of images has furnished us with refined theoretical frameworks characterising various aspects of images that could and should be ...
Marjo Markkula, Eero Sormunen
CICLING
2005
Springer
15 years 10 months ago
Learning the Query Generation Patterns
Abstract. With the current method of query formation, a Question Answering system retrieves a set of documents that are similar to a question, while what is mostly required is a se...
Marcin Skowron, Kenji Araki