Sciweavers

129 search results - page 21 / 26
» Why do Users Tag
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
CGA
1998
13 years 7 months ago
Principles for Information Visualization Spreadsheets
ns, with large, abstract, multidimensional data sets that are visually represented in multiple ways. We illustrate how spreadsheet techniques provide a structured, intuitive, and p...
Ed Huai-hsin Chi, John Riedl, Phillip Barry, Josep...
PCM
2004
Springer
121views Multimedia» more  PCM 2004»
14 years 1 months ago
A Java-Based Collaborative Authoring System for Multimedia Presentation
Abstract. In this paper, we propose a Java-based collaborative authoring system for multimedia presentation. Our system is composed of an Editing System, a Media Object Manager and...
Mee Young Sung, Do Hyung Lee
ATAL
2000
Springer
14 years 3 days ago
Layered Disclosure: Revealing Agents' Internals
A perennial challenge in creating and using complex autonomous agents is following their choices of actions as the world changes dynamically and understanding why they act as they ...
Patrick Riley, Peter Stone, Manuela M. Veloso
NAR
2006
71views more  NAR 2006»
13 years 7 months ago
TSEMA: interactive prediction of protein pairings between interacting families
An entire family of methodologies for predicting protein interactions is based on the observed fact that families of interacting proteins tend to have similar phylogenetic trees d...
José M. G. Izarzugaza, David de Juan, Carle...