Sciweavers

380 search results - page 36 / 76
» Understanding human strategies for change: an empirical stud...
Sort
View
SOUPS
2006
ACM
14 years 1 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
CHI
2011
ACM
12 years 11 months ago
From the lab to the world: lessons from extending a pointing technique for real-world use
We present the Pointing Magnifier as a case study for understanding the issues and challenges of deploying lab-validated pointing facilitation techniques into the real world. The ...
Alex Jansen, Leah Findlater, Jacob O. Wobbrock
ACL
2008
13 years 9 months ago
Extractive Summaries for Educational Science Content
This paper describes an extractive summarizer for educational science content called COGENT. COGENT extends MEAD based on strategies elicited from an empirical study with domain a...
Sebastian de la Chica, Faisal Ahmad, James H. Mart...
NAACL
2003
13 years 9 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees
JCS
2011
126views more  JCS 2011»
13 years 2 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe