Sciweavers

216 search results - page 17 / 44
» Revealing Web User Requirements through e-Prototyping
Sort
View
SC
2009
ACM
14 years 1 days ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
BCSHCI
2007
13 years 8 months ago
Expert habits vs. UI improvements: re-design of a room booking system
This paper presents the results of a case study examining prototyping as a method in re-designing a user interface (UI). In the case presented, a web-based room booking was re-des...
Per A. Jonasson, Morten Fjeld, Aiko Fallas Yamashi...
IJCAI
2003
13 years 8 months ago
Improving the Performance of Recommender Systems That Use Critiquing
Personalization actions that tailor the Web experience to a particular user are an integral component of recommender systems. Here, product knowledge - either hand-coded or “mine...
Lorraine McGinty, Barry Smyth
APWEB
2010
Springer
14 years 6 days ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 8 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim