Sciweavers

1018 search results - page 75 / 204
» Remote User Authentication Using Public Information
Sort
View
BCSHCI
2008
13 years 9 months ago
User test of soccer highlights application
This paper describes an evaluation of a consumer application for soccer highlights detection, which combines advanced user interaction with an underlying automatic highlights dete...
Lu Wang, Pedro Fonseca, Bas Zoetekouw
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 2 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ACMSE
2006
ACM
14 years 2 months ago
Evaluation of a location-linked notes system
We present a location-aware messaging system that lets users read and post notes linked to a particular location. We developed multiple clients (designed to run on desktop compute...
Manas Tungare, Ingrid Burbey, Manuel A. Pér...
ERCIMDL
2006
Springer
113views Education» more  ERCIMDL 2006»
13 years 11 months ago
Large-Scale Impact of Digital Library Services: Findings from a Major Evaluation of SCRAN
Abstract. This paper reports on an evaluation carried out on behalf of the Scottish Library and Information Council (SLIC) of a Scottish Executive initiative to fund a year's ...
Gobinda G. Chowdhury, David McMenemy, Alan Poulter
CLIMA
2009
13 years 6 months ago
Argumentation-Based Preference Modelling with Incomplete Information
Abstract. No intelligent decision support system functions even remotely without knowing the preferences of the user. A major problem is that the way average users think about and ...
Wietske Visser, Koen V. Hindriks, Catholijn M. Jon...