Sciweavers

570 search results - page 88 / 114
» How to Evaluate Models of User Affect
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
MOBIWAC
2009
ACM
14 years 2 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
CHI
2005
ACM
14 years 8 months ago
A method to standardize usability metrics into a single score
Current methods to represent system or task usability in a single metric do not include all the ANSI and ISO defined usability aspects: effectiveness, efficiency & satisfactio...
Jeff Sauro, Erika Kindlund
CHI
2002
ACM
14 years 8 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
TELSYS
2002
131views more  TELSYS 2002»
13 years 7 months ago
Call Blocking Performance Study for PCS Networks under More Realistic Mobility Assumptions
Abstract. In the micro-cell-based PCS networks, due to the high user mobility, handoffs occur more frequently. Hence, the classical assumptions, such as the exponential assumptions...
Helen Zeng, Yuguang Fang, Imrich Chlamtac