Under Intranet or Internet environment, it becomes more and more important how to make application systems communicate and share data seamlessly, thus eliminates the huge information isolated island, realizes the info...
详细信息
There is a great demand for astronomers to process and analyze mass data which distribute all over the word through e-Science technology. Virtual observatory (VO) technology, quickly developed in recent three years, i...
详细信息
In this study we propose a novel bimanual selection technique called Lever Cursor for distant target acquisition in the interface of multitouch tabletop. Lever Cursor couples the absolute and relative manipulation mod...
详细信息
Open source software is the software that must be distributed with source codes included and availab.e to be modified under the GNU General Public License (GPL). The source codes should be in the same form that a prog...
详细信息
In this paper, a component library model based on the four-layer architecture is presented. The four-layer architecture includes framework layer, component layer, leaf-class layer and leaf-function (leaf-method) layer...
详细信息
Pressure and strokes are the much natural input modalities from pens. This study investigates the potentials of coupling pressure and strokes with pen-based interactions by discussing the possible strategies of using ...
详细信息
This study empirically explores a cube-shape tool based on computer vision, focusing on the properties of its input modalities and design space. By tracking the fiducial marker on each side of the cube in real-time, b...
详细信息
Data sharing and distribution are critically significant in international astronomical research cooperation. In this study, based on scientific workflow technique, we further presented a batch data sharing system to s...
详细信息
The performance of language retrieval method is largely determined by the accuracy of document language model. Motivated by the hypothesis that query-biased summary presents the information that is most relevant to a ...
详细信息
Access control is a significant concept in the fields of information security. However, to date, it is still difficult to design an effective access control mechanism to support numerous users incorporating numerous d...
详细信息
暂无评论