Sciweavers

1931 search results - page 356 / 387
» Why we blog
Sort
View
SI3D
1997
ACM
14 years 2 months ago
Attention and Visual Feedback: The Bimanual Frame of Reference
We investigate the synergy of the two hands for virtual object manipulation. We report results from an experiment which suggest that the two hands together provide sufficient per...
Ken Hinckley, Randy F. Pausch, Dennis Proffitt
ECP
1997
Springer
103views Robotics» more  ECP 1997»
14 years 2 months ago
Plan-Refinement Strategies and Search-Space Size
During the planning process, a planner may have many options for refinements to perform on the plan being developed. The planner’s efficiency depends on how it chooses which ref...
Reiko Tsuneto, Dana S. Nau, James A. Hendler
CHI
1996
ACM
14 years 2 months ago
Email Overload: Exploring Personal Information Management of Email
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was originally designed as a communications application...
Steve Whittaker, Candace L. Sidner
ICDCS
2010
IEEE
14 years 1 months ago
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
Abstract—We present results from measurements of the filtering of HTTP HTML responses in China, which is based on string matching and TCP reset injection by backbone-level route...
Jong Chun Park, Jedidiah R. Crandall
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
14 years 1 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...