Results 11 - 20
of
7,133
User See, User Point: Gaze and Cursor Alignment in Web Search
"... Past studies of user behavior in Web search have correlated eye-gaze and mouse cursor positions, and other lines of research have found cursor interactions to be useful in determining user intent and relevant parts of Web pages. However, cursor interactions are not all the same; different types of c ..."
Abstract
-
Cited by 24 (6 self)
- Add to MetaCart
Past studies of user behavior in Web search have correlated eye-gaze and mouse cursor positions, and other lines of research have found cursor interactions to be useful in determining user intent and relevant parts of Web pages. However, cursor interactions are not all the same; different types
Seeing is retrieving: building information context from what the user sees
- In IUI ’08
, 2008
"... As the user’s document and application workspace grows more diverse, supporting personal information management becomes increasingly important. This trend toward diver-sity renders it difficult to implement systems which are tai-lored to specific applications, file types, or other information source ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
sources. We developed SeeTrieve, a personal document retrieval and classification system which abstracts applications by con-sidering only the text they present to the user through the user interface. Associating the visible text which surrounds a document in time, SeeTrieve is able to identify important
A Touring Machine: Prototyping 3D Mobile Augmented Reality Systems for Exploring the Urban Environment
, 1997
"... We describe a prototype system that combines together the overlaid 3D graphics of augmented reality with the untethered freedom of mobile computing. The goal is to explore how these two technologies might together make possible wearable computer systems that can support users in their everyday inter ..."
Abstract
-
Cited by 373 (36 self)
- Add to MetaCart
We describe a prototype system that combines together the overlaid 3D graphics of augmented reality with the untethered freedom of mobile computing. The goal is to explore how these two technologies might together make possible wearable computer systems that can support users in their everyday
What users see—Structures in search engine results pages
- Information Sciences
, 2009
"... This is a preprint of an article accepted for publication in Information Sciences 179(2009) This paper investigates the composition of search engine results pages. We define what elements the most popular web search engines use on their results pages (e.g., organic results, advertisements, shortcuts ..."
Abstract
-
Cited by 9 (5 self)
- Add to MetaCart
. Findings include that search engines use quite different approaches to results pages composition and therefore, the user gets to see quite different results sets depending on the search engine and search query used. Organic results still play the major role in the results pages, but different shortcuts
MUSTARD: A Multi User See Through AR Display
"... We present MUSTARD, a multi-user dynamic random hole see-through display, capable of delivering viewer dependent information for objects behind a glass cabinet. Multiple viewers are allowed to observe both the physical object(s) being augmented and their location dependent annotations at the same ti ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
We present MUSTARD, a multi-user dynamic random hole see-through display, capable of delivering viewer dependent information for objects behind a glass cabinet. Multiple viewers are allowed to observe both the physical object(s) being augmented and their location dependent annotations at the same
Recommendation as Classification: Using Social and Content-Based Information in Recommendation
- In Proceedings of the Fifteenth National Conference on Artificial Intelligence
, 1998
"... Recommendation systems make suggestions about artifacts to a user. For instance, they may predict whether a user would be interested in seeing a particular movie. Social recomendation methods collect ratings of artifacts from many individuals and use nearest-neighbor techniques to make recommendatio ..."
Abstract
-
Cited by 342 (8 self)
- Add to MetaCart
Recommendation systems make suggestions about artifacts to a user. For instance, they may predict whether a user would be interested in seeing a particular movie. Social recomendation methods collect ratings of artifacts from many individuals and use nearest-neighbor techniques to make
Using Predictive Prefetching to Improve World Wide Web Latency
- COMPUTER COMMUNICATION REVIEW
, 1996
"... The long-term success of the World Wide Web depends on fast response time. People use the Web to access information from remote sites, but do not like to wait long for their results. The latency of retrieving a Web document depends on several factors such as the network bandwidth, propagation tim ..."
Abstract
-
Cited by 341 (5 self)
- Add to MetaCart
by predicting and prefetching files that are likely to be requested soon, while the user is browsing through the currently displayed page. In our scheme the server, which gets to see requests from several clients, makes predictions while individual clients initiate prefetching. We evaluate our scheme based
Efficient power control via pricing in wireless data networks
- IEEE Trans. on Commun
, 2002
"... Abstract—A major challenge in the operation of wireless communications systems is the efficient use of radio resources. One important component of radio resource management is power control, which has been studied extensively in the context of voice communications. With the increasing demand for wir ..."
Abstract
-
Cited by 339 (8 self)
- Add to MetaCart
is referred to as the utility and distributed power control is a noncooperative power control game where users maximize their utility. The outcome of the game results in a Nash equilibrium that is inefficient. We introduce pricing of transmit powers in order to obtain Pareto improvement of the noncooperative
Visual Cryptography
- A PRELIMINARY VERSION OF THIS PAPER APPEARED IN EUROCRYPT 94.
"... In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant ofthek out of n secret sharing problem, in which a dealer provides a t ..."
Abstract
-
Cited by 327 (4 self)
- Add to MetaCart
transparency to each one of the n users � any k of them can see the image by stacking their transparencies, but any k - 1 of them gain no information about it.
Results 11 - 20
of
7,133