Sciweavers

757 search results - page 105 / 152
» Automatic Support for Usability Evaluation
Sort
View
SOUPS
2009
ACM
15 years 11 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
FQAS
2004
Springer
104views Database» more  FQAS 2004»
15 years 9 months ago
Logic-Based Integration of Query Answering and Knowledge Discovery
Abstract. There is currently great interest in integrating knowledge discovery research into mainstream database systems. Such an enterprise is nontrivial because knowledge discove...
Marcelo A. T. Aragão, Alvaro A. A. Fernande...
CONSTRAINTS
2010
126views more  CONSTRAINTS 2010»
15 years 4 months ago
Lexicographically-ordered constraint satisfaction problems
Abstract. We describe a simple CSP formalism for handling multi-attribute preference problems with hard constraints, one that combines hard constraints and preferences so the two a...
Eugene C. Freuder, Robert Heffernan, Richard J. Wa...
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
EUROSYS
2011
ACM
14 years 7 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...