Behavior and usability analysis for multimodal user interfaces

2021-03-01
Dibeklioğlu, Hamdi
Sürer, Elif
Salah, Albert Ali
Dutoit, Thierry

Suggestions

Performance evaluation of database recovery techniques
Eşkinat, Ege Cem; Güran, Hasan; Department of Electrical and Electronics Engineering (1990)
PErformance and time requirement analysis of top hat transform based small target detection algorithms
Ulusoy, İlkay (2015-04-24)
Top-Hat transform is well known background suppression method used in small target detection. In this paper, we investigate various different Top-Hat transformation based small target detection approaches. All of the methods are implemented with their best parameter settings and applied to the same test image. The comparison among them is done in terms of three issues: 1. the detection performance (precision and false alarm rate), 2. the time requirement of the method and its usability for real time applica...
Performance evaluation of routing protocols in wireless ad hoc networks with service differentiation
Yılmaz, Semra; Koçyiğit, Altan; Erten, Murat; Department of Information Systems (2003)
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. Due to the limitations in the wireless environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing pro...
Performance analysis of elliptic curve multiplication algorithms for elliptic curve cryptography
Özcan, Ayça Bahar; Yücel, Melek D; Department of Electrical and Electronics Engineering (2006)
Elliptic curve cryptography (ECC) has been introduced as a public-key cryptosystem, which offers smaller key sizes than the other known public-key systems at equivalent security level. The key size advantage of ECC provides faster computations, less memory consumption, less processing power and efficient bandwidth usage. These properties make ECC attractive especially for the next generation public-key cryptosystems. The implementation of ECC involves so many arithmetic operations; one of them is the ellipt...
Performance comparison of pattern discovery methods on web log data
Bayir, Murat Ali; Toroslu, İsmail Hakkı; Coşar, Ahmet (2006-03-11)
One of the popular trends in computer science has been development of intelligent web-based systems. Demand for such systems forces designers to make use of knowledge discovery techniques on web server logs. Web usage mining has become a major area of knowledge discovery on World Wide Web. Frequent pattern discovery is one of the main issues in web usage mining. These frequent patterns constitute the basic information source for intelligent web-based systems. In this paper; frequent pattern mining algorithm...
Citation Formats
H. Dibeklioğlu, E. Sürer, A. A. Salah, and T. Dutoit, “Behavior and usability analysis for multimodal user interfaces,” Journal on Multimodal User Interfaces, pp. 1–2, 2021, Accessed: 00, 2021. [Online]. Available: https://link.springer.com/content/pdf/10.1007/s12193-021-00372-0.pdf.