Sciweavers

94 search results - page 8 / 19
» To Booth or not to Booth
Sort
View
ATAL
2004
Springer
14 years 1 months ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
EGOV
2007
Springer
13 years 11 months ago
What Are the Future Possibilities of eDemocracy? A Discussion Paper
This paper presents some future possibilities for eDemocracy tools and considers how these new technologies might conflict with our basic assumptions about what democracy should be...
Ovid Pacific Boyd
WWW
2001
ACM
14 years 8 months ago
Auditing for Accessibility
The paper discusses recent web Accessibility Audits produced by the authors [8] ? audits that have the dual aims of raising accessibility levels of the subject sites and the gener...
Lorna Gibson, David Sloan, Peter Gregor, Paul Boot...
CHI
2010
ACM
14 years 2 months ago
Investigating an appropriate design for personal firewalls
Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to ...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov,...
LORI
2009
Springer
14 years 2 months ago
A General Family of Preferential Belief Removal Operators
Most belief change operators in the AGM tradition assume an underlying plausibility ordering over the possible worlds which is transitive and complete. A unifying structure for the...
Richard Booth, Thomas Meyer, Chattrakul Sombatthee...