Sciweavers

622 search results - page 90 / 125
» User Profiles for Personalized Information Access
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
CHI
2009
ACM
14 years 10 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
CHI
2009
ACM
14 years 10 months ago
The design of ViVA: a mixed-initiative visual vocabulary for aphasia
In this paper, we present the design of ViVA, a visual vocabulary for aphasia. Aphasia is an acquired language disorder that causes variability of impairments affecting individual...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Perry R....
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 4 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
COLCOM
2009
IEEE
14 years 3 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...