• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,133
Next 10 →

• Users see

by Ludwig-maximilians-universität München, Lfe Medieninformatik, Andreas Butz, Albrecht Schmidt
"... only what is visible! Butz/Schmidt – Medieninformatik – LMU München – Vorlesung MMI –WS04/05 2004-11-23 – 3What the Developer Knows • Users see only what is visible! users have little idea about: – architecture, – state transitions, – dependencies – application context – system restrictions Butz/Sch ..."
Abstract - Add to MetaCart
only what is visible! Butz/Schmidt – Medieninformatik – LMU München – Vorlesung MMI –WS04/05 2004-11-23 – 3What the Developer Knows • Users see only what is visible! users have little idea about: – architecture, – state transitions, – dependencies – application context – system restrictions Butz

Toolglass and magic lenses: The see-through interface

by Eric A. Bier, Maureen C. Stone, Ken Pier, William Buxton, Tony D. Derose , 1993
"... Toolglass ™ widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positioned with one hand while the other positions the cursor. The widgets provide a rich and concise vocabulary for operating on ..."
Abstract - Cited by 506 (8 self) - Add to MetaCart
Toolglass ™ widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positioned with one hand while the other positions the cursor. The widgets provide a rich and concise vocabulary for operating

Marker tracking and HMD calibration for a video-based augmented reality conferencing system

by Hirokazu Kato - in The 2nd International Workshop on Augmented Reality (IWAR 99 , 1999
"... We describe an augmented reality conferencing system which uses the overlay of virtual images on the real world. Remote collaborators are represented on Virtual Monitors which can be freely positioned about a user in space. Users can collaboratively view and interact with virtual objects using a sha ..."
Abstract - Cited by 527 (26 self) - Add to MetaCart
We describe an augmented reality conferencing system which uses the overlay of virtual images on the real world. Remote collaborators are represented on Virtual Monitors which can be freely positioned about a user in space. Users can collaboratively view and interact with virtual objects using a

3 What the User Sees • Users see only what is openly visible!

by Lmu München, Medieninformatik Andreas, Butz Mensch-maschine-interaktion Ss, Lmu München, Medieninformatik Andreas, Butz Mensch-maschine-interaktion Ss, Lmu München, Medieninformatik Andreas, Butz Mensch-maschine-interaktion Ss, Lmu München, Medieninformatik Andreas, Butz Mensch-maschine-interaktion Ss, Lmu München, Medieninformatik Andreas, Butz Mensch-maschine-interaktion Ss, Lmu München, Medieninformatik Andreas, Butz Mensch-maschine-interaktion Ss
"... • Users have little idea about: – architecture, – state transitions, – dependencies – application context – system restrictions • And users often do not want to know about it. ..."
Abstract - Add to MetaCart
• Users have little idea about: – architecture, – state transitions, – dependencies – application context – system restrictions • And users often do not want to know about it.

Towards Building User Seeing Computers *

by Council Canada, Gilles Bessens, Dmitry O. Gorodnichy , 2005
"... de l'information ..."
Abstract - Add to MetaCart
de l'information

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
between ORs, and in later designs added padding between onion proxies (users) and ORs Many TCP streams can share one circuit: Onion Routing originally built a separate circuit for each applicationlevel request, but this required multiple public key operations for every request, and also presented a

Information Filtering and Information Retrieval: Two Sides of the Same Coin

by Nicholas J. Belkin, W. Bruce Croft - COMMUNICATIONS OF THE ACM , 1992
"... Information filtering systems are designed for unstructured or semistructured data, as opposed to database applications, which use very structured data. The systems also deal primarily with textual information, but they may also entail images, voice, video or other data types that are part of multim ..."
Abstract - Cited by 441 (6 self) - Add to MetaCart
, that typically represent long-term interests. Filtering also implies removal of data from an incoming stream rather than finding data in the stream; users see only the data that is extracted. Models of information retrieval and filtering, and lessons for filtering from retrieval research are presented.

Functional Paleontology: System Evolution as the User Sees It

by Annie I. Antón, Colin Potts - IN PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING , 2001
"... It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with black-box analysis of function has necessarily been de-emphasized in favor of code-based analysis and designer-oriented int ..."
Abstract - Cited by 30 (1 self) - Add to MetaCart
-oriented interpretation. In this paper, we redress this balance by describing "functional paleontology", an approach to analyzing the evolution of user-visible features or services independent of architecture and design intent. We classify the benefits and burdens of interpersonal communication services

Automatically validating temporal safety properties of interfaces

by Thomas Ball, Sriram K. Rajamani , 2001
"... We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property. The pro ..."
Abstract - Cited by 433 (21 self) - Add to MetaCart
We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property

MUST-D: Multi-User See Through Display

by Abhijit Karnik, Walterio Mayol-cuevas, Sriram Subramanian
"... In this paper we present MUST-D a multi-user seethrough display that allows users to inspect objects behind a glass panel while projecting view dependent information on the glass to the user. MUST-D uses liquid crystal panels to implement a multi-view see-through display space in front of physical o ..."
Abstract - Add to MetaCart
In this paper we present MUST-D a multi-user seethrough display that allows users to inspect objects behind a glass panel while projecting view dependent information on the glass to the user. MUST-D uses liquid crystal panels to implement a multi-view see-through display space in front of physical
Next 10 →
Results 1 - 10 of 7,133
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University