Sciweavers

1070 search results - page 141 / 214
» A Study on Personality in Designing Adaptive e-Learning Syst...
Sort
View
DARE
2000
170views more  DARE 2000»
13 years 9 months ago
Augmented reality: which augmentation for which reality?
In this paper, we first present a brief review of approaches used for studying and designing Augmented Reality (AR) systems. The variety of approaches and definitions in AR requir...
Emmanuel Dubois, Laurence Nigay
CSE
2009
IEEE
14 years 2 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
CHI
2011
ACM
12 years 11 months ago
Should I open this email?: inbox-level cues, curiosity and attention to email
The quantity of email people receive each day can be overwhelming. Previous research suggests that when handling email, individuals prioritize certain messages for attention over ...
Jaclyn Wainer, Laura Dabbish, Robert Kraut
UMUAI
2010
107views more  UMUAI 2010»
13 years 6 months ago
PERSONAF: framework for personalised ontological reasoning in pervasive computing
Abstract. Pervasive computing creates possibilities for presenting highly personalised information about the people, places and things in a building. One of the challenges for such...
William T. Niu, Judy Kay
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...