Sciweavers

15379 search results - page 240 / 3076
» Protecting users from
Sort
View
MOBISYS
2011
ACM
12 years 11 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
CAISE
2006
Springer
13 years 12 months ago
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems
Trust emerges from interaction. If trust in information systems is to be promoted, then attention must be directed, at least in part, to interaction design. This presentation will ...
Larry L. Constantine
JAISE
2010
88views Algorithms» more  JAISE 2010»
13 years 3 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
LREC
2008
139views Education» more  LREC 2008»
13 years 9 months ago
Automatic Learning and Evaluation of User-Centered Objective Functions for Dialogue System Optimisation
The ultimate goal when building dialogue systems is to satisfy the needs of real users, but quality assurance for dialogue strategies is a non-trivial problem. The applied evaluat...
Verena Rieser, Oliver Lemon
DEXAW
2008
IEEE
124views Database» more  DEXAW 2008»
13 years 10 months ago
Weighting Influence of User Behavior in Software Validation
Validation is an essential part of software development, and testing is a practical and widely used approach. The emerging methodology is model-based testing, in which test cases ...
Antonia Bertolino, Emanuela G. Cartaxo, Patr&iacut...