Sciweavers

3042 search results - page 75 / 609
» Designing for all users: including the odd users
Sort
View
LWA
2008
13 years 10 months ago
Capturing the needs of amateur web designers by means of examples
Many sites are created by people who lack professional training in web design. We present `SiteGuide', a tool that helps amateur web designers to decide which information wil...
Vera Hollink, Viktor de Boer, Maarten van Someren
SAC
2009
ACM
14 years 3 months ago
Development of a biosignals framework for usability analysis
The understanding of human physical and physiological signals and expressions, together with a growing processing and control capacity allows for new approaches in interactive sys...
Inês Oliveira, Rui Lopes, Nuno Guimarã...
INFOCOM
2012
IEEE
11 years 11 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 10 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
IEEECIT
2010
IEEE
13 years 7 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu