Sciweavers

3149 search results - page 149 / 630
» Users in Context
Sort
View
COMSWARE
2007
IEEE
15 years 10 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
DBSEC
2006
86views Database» more  DBSEC 2006»
15 years 5 months ago
Enhancing User Privacy Through Data Handling Policies
The protection of privacy is an increasing concern in today's global infrastructure. One of the most important privacy protection principles states that personal information c...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
141
Voted
PUC
2007
150views more  PUC 2007»
15 years 3 months ago
Probing user values in the home environment within a technology driven Smart Home project
Smart Home technology looks set to become an increasingly common feature of domestic life. However commercial desire for technical innovation rather than explicit user needs are of...
Victoria Haines, Val Mitchell, Catherine Cooper, M...
132
Voted
INTERACTIONS
2010
92views more  INTERACTIONS 2010»
15 years 26 days ago
PUX: patterns of user experience
s from a concrete to a new abstract level of description [1]. Rises in abstraction level happen regularly in all fields, but the key difference in Alexander's work was that ra...
Alan F. Blackwell, Sally Fincher
90
Voted
HCI
2007
15 years 5 months ago
A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships
This paper describes a hybrid methodology to study users in ongoing relationships based on three levels of user data analysis. Most user-centered design methods are ideal for the a...
Enric Mor, Muriel Garreta Domingo, Julià Mi...