Sciweavers

2795 search results - page 219 / 559
» Recommended or Not
Sort
View
129
Voted
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 10 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 10 months ago
Implementation of Internet Technology for Local Government Website: Design Guidelines
There may be limited resources for local government website designers to devote to innovative design. This study investigated current technology use by local government (Town of B...
Hyung Nam Kim, Andrea L. Kavanaugh, Tonya L. Smith...
IEEEARES
2007
IEEE
15 years 10 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli
VL
2007
IEEE
116views Visual Languages» more  VL 2007»
15 years 10 months ago
Mapping the Space of API Design Decisions
When creating new application programming interfaces (APIs), designers must make many decisions. These decisions affect the quality of the resulting APIs in terms of performance (...
Jeffrey Stylos, Brad A. Myers
ENTER
2007
Springer
15 years 10 months ago
Quo Vadis Homo Turisticus? Towards a Picture-based Tourist Profiler
The World Wide Web has become an important source of information for tourists planning their vacation. So, destination recommendation systems supporting users in their decision ma...
Helmut Berger, Michaela Denk, Michael Dittenbach, ...