Results

[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Usage data logged from user interactions can be extremely valuable for evaluating software usability. However, instrumenting software to collect usage data is a time-intensive task that often requires technical expertise as well as an understanding of the usability issues to be explored. We have...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
This paper describes work we have done over the past five years in developing e-
learning applications and tools using Semantic Web and Web 2.0 technologies. It does not
provide a comprehensive description of these tools; instead, we focus on the pitfalls we have
encountered and attemp...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Tag clouds are a popular method for visualizing and linking socially-organized information on websites. Tag clouds represent variables of interest (such as popularity) in the visual appearance of the keywords themselves - using text properties such as font size, weight, or colour. Although tag c...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Today’s technology enhanced learning practices cater to students and teachers who use many different learning tools and environments and are used to a paradigm of interaction derived from open, ubiquitous, and socially-oriented services. In this context, a crucial issue for education systems in ge...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Pointing at displays from a distance is becoming a common scenario for controlling computers and entertainment systems. Several devices use direct-pointing methods, where the user points a hand-held device at targets on a screen, but these often suffer from accuracy probl...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Information seeking on the Web has become a central part of many daily activities. Even though information seeking is extremely common, there are many times when these tasks are unsuccessful, because the information found is less than ideal or the task could have been completed more efficiently. In...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Crisis command centres often gather data from disparate locations and collect it for visualization on a large, shared screen. However, the resulting visualization often lacks expressiveness: it fails to express nuanced mediating characteristics about the information, such as speci...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Finite Deterministic Cover Automata (DFCA) can be obtained from Deterministic Finite Automata (DFA) using the similarity relation-Since the similarity relation is not an equivalence relation, the minimal DFCA for a finite language is usually not unique. We count the number of minimal DFCA that can b...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Steering and driving tasks – where the user controls a vehicle or other object along a path – are common in many simulations and games. Racing video games have provided users with different views of the visual environment – e.g., overhead, first-person, and third-person views. Although researc...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Inspired by theories of how professionals enter into a reflective conversation with their work materials, the research area of interaction history seeks to make use of the accumulated actions of many people in working with digital objects. Despite compelling system designs and empirical results in l...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Aim-assistance techniques have been shown to work for player balancing in 2D environments, but little information exists about how well these techniques will work in a 3D FPS game. We carried out three studies of the performance of five different aim assists in an Unreal-based game world. The assist...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
This paper presents a novel method to study the evolution of Linux kernel components using complex networks to understand how Linux kernel components evolve over time. After analyzing the node degree distribution, clustering coefficient, and average path length of the call graphs corresponding to th...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Inspired by the backbone concept in wired networks, virtual backbone is expected to bring substantial benefits to routing in wireless sensor networks (WSNs). Virtual backbone construction based on Connected Dominating Set (CDS) is a competitive approach among the existing methods used to establish v...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Data gathering in sensor networks is required to be efficient, adaptable and robust. Recently, compressive sensing (CS) based data gathering shows promise in meeting these requirements. Existing CS-based data gathering solutions require that a transform that best sparsifies the sensor readings shoul...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Background: Piscine reovirus (PRV) is a newly discovered fish reovirus of anadromous and marine fish ubiquitous among fish in Norwegian salmon farms, and likely the causative agent of heart and skeletal muscle inflammation (HSMI). HSMI is an increasingly economically significant disease in Atlantic ...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Patients typically undergo physiotherapy with the help of a physiotherapist who teaches, guides, and corrects the patients as they perform exercises. It would be nice if people could repeat these exercises at home, potentially improving their recovery rate. However, without guidance and/or correctiv...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Pointing at displays from a distance is becoming a common method of interacting with computer applications and entertainment systems, using devices such as the Wii Remote, the PlayStation Move controller, or the Microsoft Kinect. These systems often implement relative forms of ray-cast pointing,...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Most searchers do not know how to use Web search engines as effectively as possible. This is due, in part, to search engines not providing feedback about how search behavior can be improved. Because feedback is an essential part of learning, we created the Search Dashboard, which provides an int...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
We present a fast incremental algorithm for constructing minimal Deterministic Finite Cover Automata (DFCA) for a given language. Since it was shown that the minimal DFCA for a language L has less states than the minimal Deterministic Finite Automata (DFA) for the same language L, this technique see...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
We define the pattern expressions as an extension of both regular expressions and patterns. We prove several properties of the new family of languages, similar to those of extended regex languages [Câmpeanu et al., Int. J. Found. Comput. Sci. 14 (6) (2003) 1007–1018]. We also define an automata s...
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
[Page generation failure. The bibliography processor requires a browser with Javascript enabled.]
Regular expressions are used in many practical applications. Practical regular expressions are commonly called "regex". It is known that regex are different from regular expressions. In this paper, we give regex a formal treatment. We make a distinction between regex and extended regex; while regex ...