Sciweavers

1818 search results - page 68 / 364
» How users use access control
Sort
View
HT
2004
ACM
14 years 2 months ago
How much is too much in a hypertext link?: investigating context and preview - a formative evaluation
A high quality of free movement, or mobility, is key to the accessibility, design, and usability of many ‘common-use’ hypermedia resources (Web sites) and key to good mobility...
Simon Harper, Yeliz Yesilada, Carole A. Goble, Rob...
IJCAI
1989
13 years 10 months ago
Bidirectional Use of Knowledge in the Multi-modal NL Access System XTRA
The acceptability and effectiveness of an expert system is critically dependent on its user interface. Natural language could be a well-suited communicative medium; however, curre...
Jürgen Allgayer, Roman M. Jansen-Winkeln, Car...
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
CAISE
2003
Springer
14 years 2 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen
ASSETS
2000
ACM
14 years 1 months ago
Neck range of motion and use of computer head controls
Abstract—Head controls provide an alternative means of computer access. This study determined whether neck movement limitations are associated with reduced performance with such ...
Edmund F. LoPresti, David M. Brienza, Jennifer Ang...