منابع مشابه
Inconspicuous Personal Computer Protection with Touch-Mouse
We present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touchmouse [1] under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pressure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action primitives. This ...
متن کاملFrom Personal Computer to Personal Assistant
Much of the confusion that surrounds electronic personal assistants arises from the open-ended complexity of their development. In this paper we categorise some of their more common uses before suggesting several thought-provoking extensions.
متن کاملPersonal computer PC
As the rst step in an automated text sum-marization algorithm, this work presents a new method for automatically identifying the central ideas in a text based on a knowledge-based concept counting paradigm. To represent and generalize concepts, we use the hierarchical concept taxonomy WordNet. By setting appropriate cutoo values for such parameters as concept generality and child-to-parent freq...
متن کاملAnalysis of Personal Computer Workloads
Most published research on system behavior and workload characterization has been based on either Unix systems or large, usually IBM, mainframe systems. It is reasonable to believe that user behaviors and workloads are di erent for PC systems. Further, the aspects of system design and most needing study have changed from the mainframes dominant in the 1960s and 1970s, and the Unix systems that ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Society of Materials Science, Japan
سال: 2015
ISSN: 0514-5163,1880-7488
DOI: 10.2472/jsms.64.852