Sciweavers

1818 search results - page 104 / 364
» How users use access control
Sort
View
MHCI
2009
Springer
14 years 3 months ago
Exploring the urban environment with a camera phone: lessons from a user study
We present a study investigating two novel mobile services supporting querying for information in the urban environment using camera equipped smart phones as well as two different...
Norman Höller, Arjan Geven, Manfred Tscheligi...
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 7 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
13 years 9 months ago
Expressive and flexible access to web-extracted data: a keyword-based structured query language
Automated extraction of structured data from Web sources often leads to large heterogeneous knowledge bases (KB), with data and schema items numbering in the hundreds of thousands...
Jeffrey Pound, Ihab F. Ilyas, Grant E. Weddell
CCS
2010
ACM
13 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CHI
2007
ACM
14 years 9 months ago
An interface to support color blind computer users
A new method for adapting digital images so that they are suitable for color blind viewers is presented. In contrast to earlier automatic methods which formulate the problem of ad...
Luke Jefferson, Richard Harvey