Sciweavers

847 search results - page 162 / 170
» When Using the Tool Interferes with Doing the Task
Sort
View
JIPS
2010
389views more  JIPS 2010»
13 years 2 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
CHI
2006
ACM
14 years 7 months ago
Olfoto: designing a smell-based interaction
We present a study into the use of smell for searching digital photo collections. Many people now have large photo libraries on their computers and effective search tools are need...
Stephen A. Brewster, David K. McGookin, Christophe...
CP
2007
Springer
14 years 1 months ago
Structural Relaxations by Variable Renaming and Their Compilation for Solving MinCostSAT
Searching for optimal solutions to a problem using lower bounds obtained from a relaxation is a common idea in Heuristic Search and Planning. In SAT and CSPs, however, explicit rel...
Miquel Ramírez, Hector Geffner
CHI
2007
ACM
14 years 7 months ago
Why we tag: motivations for annotation in mobile and online media
Why do people tag? Users have mostly avoided annotating media such as photos ? both in desktop and mobile environments ? despite the many potential uses for annotations, including...
Morgan Ames, Mor Naaman
VLDB
2007
ACM
118views Database» more  VLDB 2007»
14 years 7 months ago
Inferring XML Schema Definitions from XML Data
Although the presence of a schema enables many optimizations for operations on XML documents, recent studies have shown that many XML documents in practice either do not refer to ...
Geert Jan Bex, Frank Neven, Stijn Vansummeren