Sciweavers

15379 search results - page 129 / 3076
» Protecting users from
Sort
View
CRITICAL
2005
13 years 9 months ago
A first analysis of the UsersAward programme from a value sensitive design perspective
The goal of the UsersAward programme is to develop and maintain a strategy for better workplace software through user-driven quality assessment. One of its key activities is the u...
Åke Walldius, Yngve Sundblad, Alan Borning
MSS
1999
IEEE
73views Hardware» more  MSS 1999»
14 years 4 days ago
Hiding HSM Systems from the User
File life-times longer than the life-time of HSMsystems make it necessary to move files from one HSM-system to another. Such a migration takes a long time and cannot be hidden fro...
Hartmut Reuter
WWW
2008
ACM
14 years 8 months ago
Mining the search trails of surfing crowds: identifying relevant websites from user activity
The paper proposes identifying relevant information sources from the history of combined searching and browsing behavior of many Web users. While it has been previously shown that...
Mikhail Bilenko, Ryen W. White
INFOCOM
2006
IEEE
14 years 1 months ago
Extracting a Mobility Model from Real User Traces
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...
Minkyong Kim, David Kotz, Songkuk Kim
IV
2010
IEEE
140views Visualization» more  IV 2010»
13 years 6 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza