Sciweavers

534 search results - page 65 / 107
» A study on user acceptance of error visualization techniques
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
JSA
2008
136views more  JSA 2008»
13 years 7 months ago
Evaluation and optimization of a peer-to-peer video-on-demand system
Video-on-demand (VoD) is increasingly popular with internet users. However, VoD is costly due to the load placed on video servers. Peer-to-peer (P2P) techniques are an approach to...
Bin Cheng, Xiuzheng Liu, Zheng Zhang, Hai Jin, Lex...
ICCD
2007
IEEE
157views Hardware» more  ICCD 2007»
14 years 4 months ago
Combining cluster sampling with single pass methods for efficient sampling regimen design
Microarchitectural simulation is orders of magnitude slower than native execution. As more elements are accurately modeled, problems associated with slow simulation are further ex...
Paul D. Bryan, Thomas M. Conte
ERCIMDL
2010
Springer
126views Education» more  ERCIMDL 2010»
13 years 6 months ago
Uncovering Hidden Qualities - Benefits of Quality Measures for Automatically Generated Metadata
Abstract. Today, digital libraries more and more have to rely on semantic techniques during the workflows of metadata generation, search and navigational access. But, due to the st...
Sascha Tönnies, Wolf-Tilo Balke
AVI
2004
13 years 9 months ago
Identification and validation of cognitive design principles for automated generation of assembly instructions
Designing effective instructions for everyday products is challenging. One reason is that designers lack a set of design principles for producing visually comprehensible and acces...
Julie Heiser, Doantam Phan, Maneesh Agrawala, Barb...