Sciweavers

2648 search results - page 3 / 530
» Human Factors In Computer Security
Sort
View
AGENTS
1999
Springer
14 years 24 days ago
Where to Look? Automating Attending Behaviors of Virtual Human Characters
This research proposes a computational framework for generating visual attending behavior in an embodied simulated human agent. Such behaviors directly control eye and head motion...
Sonu Chopra-Khullar, Norman I. Badler
ECTEL
2010
Springer
13 years 9 months ago
Content, Social, and Metacognitive Statements: An Empirical Study Comparing Human-Human and Human-Computer Tutorial Dialogue
Abstract. We present a study which compares human-human computermediated tutoring with two computer tutoring systems based on the same materials but differing in the type of feedba...
Myroslava Dzikovska, Natalie B. Steinhauser, Johan...
SOUPS
2010
ACM
14 years 12 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
SIGIR
2002
ACM
13 years 8 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny