Sciweavers

231 search results - page 15 / 47
» Modeling the User Acceptance of E-Mail
Sort
View
PET
2012
Springer
11 years 9 months ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...
DICTA
2009
13 years 4 months ago
Soft-Biometrics: Unconstrained Authentication in a Surveillance Environment
Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. These include traits such as height, weight, gender, hair, skin and cloth...
Simon Denman, Clinton Fookes, Alina Bialkowski, Sr...
GRAPHITE
2003
ACM
13 years 12 months ago
Interactive visual method for motion and model reuse
We consider a repository of animation models and motions that can be reused to generate new animation sequences. For instance, a user can retrieve an animation of a dog kicking it...
Akanksha Huang, Zhiyong Huang, B. Prabhakaran, Con...
JTAER
2006
109views more  JTAER 2006»
13 years 6 months ago
Shopping Online or Not? Cognition and Personality Matters
E-commerce has brought both opportunities and challenges to Internet marketers. One challenge facing the marketers is to "convert" Internet users who are reluctant to bu...
Sophia Wang, Simon Wang, Ming T. Wang
ANSS
2008
IEEE
14 years 1 months ago
Executable Protocol Models as a Requirements Engineering Tool
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...
Ashley T. McNeile, Ella E. Roubtsova