Sciweavers

1545 search results - page 283 / 309
» Information Systems Success Revisited
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ISMIR
2000
Springer
225views Music» more  ISMIR 2000»
13 years 11 months ago
Beyond VARIATIONS: Creating a Digital Music Library
This presentation will focus primarily on work being done at Indiana University in the area of digital music libraries, with some discussion of related efforts. Indiana University...
Jon W. Dunn
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
13 years 11 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
SIMVIS
2007
13 years 8 months ago
Chances and Limits of Progression in Visualization
The amount of data to be represented by visualization systems requires new ideas for data processing and representation. As proposed in this contribution, this might be solved by ...
René Rosenbaum, Heidrun Schumann