Sciweavers

15379 search results - page 255 / 3076
» Protecting users from
Sort
View
IJISTA
2010
109views more  IJISTA 2010»
13 years 6 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...
UIC
2010
Springer
13 years 6 months ago
Smart Itinerary Recommendation Based on User-Generated GPS Trajectories
Traveling to unfamiliar regions require a significant effort from novice travelers to plan where to go within a limited duration. In this paper, we propose a smart recommendation...
Hyoseok Yoon, Yu Zheng, Xing Xie, Woontack Woo
CHI
2011
ACM
12 years 11 months ago
Social capital on facebook: differentiating uses and users
Though social network site use is often treated as a monolithic activity, in which all time is equally “social” and its impact the same for all users, we examine how Facebook ...
Moira Burke, Robert Kraut, Cameron Marlow
VIZSEC
2004
Springer
14 years 1 months ago
User re-authentication via mouse movements
We present an approach to user re-authentication based on the data collected from the computer’s mouse device. Our underlying hypothesis is that one can successfully model user ...
Maja Pusara, Carla E. Brodley
CHI
1998
ACM
14 years 14 days ago
Adapting User Interface Design Methods to the Design of Educational Activities
considered simply, but a more complex evaluation of the effects of performing the tasks. For example, an educational activity that learners complete quickly and accurately is of no...
Clayton Lewis, Cathy Brand, Gina Cherry, Cyndi Rad...