Sciweavers

582 search results - page 47 / 117
» What Will Probably Happen
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
SAC
2004
ACM
14 years 2 months ago
Applications of context-aware computing in hospital work: examples and design principles
Context-awareness is a key concept in ubiquitous computing, which sometimes seems to be a technology looking for a purpose. In this paper we report on the application of context-a...
Jakob Bardram
BIRTHDAY
2004
Springer
14 years 2 months ago
On the Formal Modelling of Trust in Reputation-Based Systems
In a reputation-based trust management system an entity’s behaviour determines its reputation which in turn affects other entities interaction with it. We present a mathematical...
Mogens Nielsen, Karl Krukow
AVBPA
2003
Springer
133views Biometrics» more  AVBPA 2003»
14 years 2 months ago
Visual Analysis of the Use of Mixture Covariance Matrices in Face Recognition
The quadratic discriminant (QD) classifier has proved to be simple and effective in many pattern recognition problems. However, it requires the computation of the inverse of the sa...
Carlos E. Thomaz, Duncan Fyfe Gillies
DIGRA
2003
Springer
14 years 2 months ago
From text to talk: multiplayer games and voiceover IP
The social experience of multiplayer gaming is mediated by the communications tools that are available to use. Until recently, these have been largely text-based, but with the adv...
John Halloran, Yvonne Rogers, Geraldine Fitzpatric...