Sciweavers

3299 search results - page 613 / 660
» Privacy and Trusted Computing
Sort
View
HRI
2009
ACM
14 years 3 months ago
Robots in the wild: understanding long-term use
It has long been recognized that novelty effects exist in the interaction with technologies. Despite this recognition, we still know little about the novelty effects associated wi...
Ja-Young Sung, Henrik I. Christensen, Rebecca E. G...
OZCHI
2009
ACM
14 years 3 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
SAC
2009
ACM
14 years 3 months ago
Link-based event detection in email communication networks
People’s email communications can be modeled as graphs with vertices representing email accounts and edges representing email communications. Email communication data usually co...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
CSE
2009
IEEE
14 years 3 months ago
Towards Automating Social Engineering Using Social Networking Sites
—A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a...
Markus Huber, Stewart Kowalski, Marcus Nohlberg, S...
MHCI
2009
Springer
14 years 3 months ago
Expectations for user experience in haptic communication with mobile devices
The haptic modality – the sense of touch – is utilized very limitedly in current human-computer interaction. Especially in mobile communication, the haptic modality could prov...
Jani Heikkinen, Thomas Olsson, Kaisa Vää...