Sciweavers

5215 search results - page 1026 / 1043
» Modeling User Interfaces to Workflow Information Systems
Sort
View
CEC
2008
IEEE
14 years 2 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
HICSS
2008
IEEE
124views Biometrics» more  HICSS 2008»
14 years 2 months ago
Measuring Factors that Influence the Success of E-Government Initiatives
Understanding how citizens value e-government services is critical to the success of these initiatives. This paper describes the development of a model to identify factors that in...
Ronnie Park
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 2 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner
VISUALIZATION
2002
IEEE
14 years 18 days ago
Kinetic Visualization - A Technique for Illustrating 3D Shape and Structure
Motion provides strong visual cues for the perception of shape and depth, as demonstrated by cognitive scientists and visual artists. This paper presents a novel visualization tec...
Eric B. Lum, Aleksander Stompel, Kwan-Liu Ma
ICNP
2000
IEEE
14 years 3 days ago
SCalable Object-tracking through Unattended Techniques (SCOUT)
A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two...
Satish Kumar, Cengiz Alaettinoglu, Deborah Estrin
« Prev « First page 1026 / 1043 Last » Next »