Sciweavers

4201 search results - page 75 / 841
» Our Users have Root!
Sort
View
SPW
2000
Springer
13 years 11 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
TVCG
2008
126views more  TVCG 2008»
13 years 8 months ago
Usability Engineering for Augmented Reality: Employing User-Based Studies to Inform Design
A major challenge, and thus opportunity, in the field of human-computer interaction and specifically usability engineering is designing effective user interfaces for emerging techn...
Joseph L. Gabbard, J. Edward Swan II
INFOCOM
2010
IEEE
13 years 6 months ago
Opportunistic Spectrum Access with Multiple Users: Learning under Competition
Abstract—The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initi...
Animashree Anandkumar, Nithin Michael, Ao Tang
IV
2010
IEEE
140views Visualization» more  IV 2010»
13 years 6 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza