Sciweavers

335 search results - page 24 / 67
» Personalized access control for a personally controlled heal...
Sort
View
IVA
2010
Springer
13 years 5 months ago
How Turn-Taking Strategies Influence Users' Impressions of an Agent
Abstract. Different turn-taking strategies of an agent influence the impression that people have of it. We recorded conversations of a human with an interviewing agent, controlled ...
Mark ter Maat, Khiet P. Truong, Dirk Heylen
CCS
2004
ACM
13 years 11 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
DELOS
2004
13 years 9 months ago
Supporting Information Access in Next Generation Digital Library Architectures
Current developments on Service-oriented Architectures, Peer-to-Peer and Grid computing promise more open and flexible architectures for digital libraries. They will open DL techno...
Ingo Frommholz, Predrag Knezevic, Bhaskar Mehta, C...
EKAW
2010
Springer
13 years 6 months ago
Social People-Tagging vs. Social Bookmark-Tagging
Abstract. Tagging has been widely used and studied in various domains. Recently, people-tagging has emerged as a means to categorize contacts, and is also used in some social acces...
Peyman Nasirifard, Sheila Kinsella, Krystian Samp,...
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...