Sciweavers

983 search results - page 125 / 197
» Personalized social
Sort
View
CHI
2009
ACM
14 years 8 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
CHI
2003
ACM
14 years 8 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey
ICALT
2008
IEEE
14 years 2 months ago
Moving Towards Life-Long User Modeling
User Modeling is the core component for the majority of personalization services. It has become an important factor in the effort to personalise a diversity of web resources accor...
Demetris Kyriacou, Hugh C. Davis
IAT
2006
IEEE
14 years 2 months ago
A Call Handling Assistant for Mobile Devices
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. The convenience this provides for people to more effectively combine different aspec...
Wayne Wobcke, Rita Chan, Andrew Limaru
ICRA
2006
IEEE
202views Robotics» more  ICRA 2006»
14 years 2 months ago
Primitive Communication based on Motion Recognition and Generation with Hierarchical Mimesis Model
— Communication skill is essential for social robots in various environments such as homes, offices, and hospitals, where the robots are expected to interact with humans. In thi...
Wataru Takano, Katsu Yamane, Tomomichi Sugihara, K...