Historically, visual display has always played a very important role in GIS applications. However, visual exploration tools do not scale well when applied to huge spatial data sets...
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Technology allows users to interact with a wide variety of information and services. However, more and more users need to integrate complementary content to previously accessed in...
This paper reports a longitudinal study of a non-speech input-controlled continuous cursor control system: Whistling User Interface (U3I). This study combines quantitative (target...
Adam J. Sporka, Sri Hastuti Kurniawan, Murni Mahmu...