• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 214,242
Next 10 →

Modality Preferences of Different User Groups

by Benjamin Weiss, Sebastian Möller, Matthias Schulz
"... Abstract—In order to examine user group differences in modality preferences, participants of either gender and two age groups have been asked to rate their experience after interact-ing with a smart-home system offering unimodal and multi-modal input possibilities (voice, free-hand gesture, smartpho ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In order to examine user group differences in modality preferences, participants of either gender and two age groups have been asked to rate their experience after interact-ing with a smart-home system offering unimodal and multi-modal input possibilities (voice, free-hand gesture

Science Maps Different Datasets Different Analyses and Visualizations Different User Groups

by Katy Börner, After Eight Years , 2012
"... Map places 554 subdisciplines on the surface of a sphere—those with papers that cite the same base knowledge are placed in closer proximity. The spheric layout is then flattened using a Mercator projection. Each node is labeled and has an extensive list of journal names and key phrases as metadata, ..."
Abstract - Add to MetaCart
Map places 554 subdisciplines on the surface of a sphere—those with papers that cite the same base knowledge are placed in closer proximity. The spheric layout is then flattened using a Mercator projection. Each node is labeled and has an extensive list of journal names and key phrases as metadata, which can be used to “science locate ” journal

A Study of the Metadata Creation Behavior of Different User Groups on the Internet

by Iris Jastram, Jin Zhang, Iris Jastram
"... Abstract: Metadata is designed to improve information organization and information retrieval effectiveness and efficiency on the Internet. The way web publishers respond to metadata and the way they use it when publishing their web pages, however, is still a mystery. The authors of this paper aim to ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
to solve this mystery by defining different professional publisher groups, examining the behaviors of these user groups, and identifying the characteristics of their metadata use. This study will enhance the current understanding of metadata application behavior and provide evidence useful to researchers

Usability of Uncertainty Visualisation Methods: A Comparison between Different User Groups

by Hansi Senaratne, Dominik Reusser, Tobias Schreck
"... Abstract: This paper presents the results of a web based survey assessing the usability of main uncertainty visualisation methods for users belonging to different key domains such as GIS and Climate change research. We assess the usability of the visualisation methods based on the user's perfor ..."
Abstract - Add to MetaCart
Abstract: This paper presents the results of a web based survey assessing the usability of main uncertainty visualisation methods for users belonging to different key domains such as GIS and Climate change research. We assess the usability of the visualisation methods based on the user

INVESTIGATING THE EFFECTS OF TRANSIT INFORMATION SYSTEMS ON DIFFERENT USER GROUPS

by Yalcin Alver
"... Abstract: This study investigates the effects of Transit Information Systems (TIS). TIS are wide range of systems that provide travelers information about travel options such as; travel times, delays and/or incidents. In this study, the important transit information types and their service levels ar ..."
Abstract - Add to MetaCart
are investigated in Izmir City, Turkey. The study focused on the transit users; considered information types for different transit mode segments were identified. In addition, accepted information types for non-transit users to consider transit as an alternative commute mode was investigated. For these purposes, a

Activity recognition from user-annotated acceleration data

by Ling Bao, Stephen S. Intille , 2004
"... In this work, algorithms are developed and evaluated to detect physical activities from data acquired using five small biaxial accelerometers worn simultaneously on different parts of the body. Acceleration data was collected from 20 subjects without researcher supervision or observation. Subjects ..."
Abstract - Cited by 515 (7 self) - Add to MetaCart
In this work, algorithms are developed and evaluated to detect physical activities from data acquired using five small biaxial accelerometers worn simultaneously on different parts of the body. Acceleration data was collected from 20 subjects without researcher supervision or observation

S. Sen Sequence-Based Masquerade Detection for Different User Groups RESEARCH ARTICLE Sequence-Based Masquerade Detection for Different User Groups

by S. Sen
"... Insider threats are one of the biggest threats that organizations are confronted with today. A masquerader who impersonates another user for his malicious activities has been studied extensively in the literature. The approaches proposed on masquerade detection mainly assume that masquerader behavio ..."
Abstract - Add to MetaCart
masquerade detection. Furthermore, the performance of these methods on different types of users and masqueraders is analyzed. We explore what kind of users are easily distinguishable from others, and what kind of masqueraders are difficult to detect. Copyright c © 2010 John Wiley & Sons, Ltd.

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW

by Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, Fred D. Davis , 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract - Cited by 1807 (10 self) - Add to MetaCart
Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3

Secure Group Communications Using Key Graphs

by Chung Kei Wong, Mohamed Gouda , Simon S. Lam - SIGCOMM '98 , 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract - Cited by 556 (17 self) - Add to MetaCart
management. We formalize the notion of a secure group as a triple (U; K;R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely

Collaborative plans for complex group action

by Barbara J. Grosz , Sarit Kraus , 1996
"... The original formulation of SharedPlans by B. Grosz and C. Sidner ( 1990) was developed to provide a model of collaborative planning in which it was not necessary for one agent to have intentions-to toward an act of a different agent. Unlike other contemporaneous approaches (J.R. Searle, 1990), this ..."
Abstract - Cited by 543 (30 self) - Add to MetaCart
The original formulation of SharedPlans by B. Grosz and C. Sidner ( 1990) was developed to provide a model of collaborative planning in which it was not necessary for one agent to have intentions-to toward an act of a different agent. Unlike other contemporaneous approaches (J.R. Searle, 1990
Next 10 →
Results 1 - 10 of 214,242
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University