Abstract User-centered design is often performed without regard to individual user differences. In this paper, we report results of an empirical study aimed to evaluate whether com...
Elena V. Zudilova-Seinstra, Boris W. van Schooten,...
Semantically-enhanced Ubiquitous User Modeling aims at the management of distributed user models and the integration into ontologies to share user information amongst adaptive appl...
Abstract—This paper considers an uplink time division multiple access (TDMA) cognitive radio network where multiple cognitive radios (secondary users) attempt to access a spect...
It is often difficult for individual tourists to make a sightseeing tour plan because they do not have prior knowledge about the destination. Although several systems have been dev...
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Form-style interfaces have been widely used to allow users to access information. In this demonstration paper, we develop a new search paradigm in form-style query interfaces, cal...
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
In earlier studies, user involvement with an embodied software agent and willingness to use that agent were partially determined by the aesthetics of the design and the moral fiber...
Matthijs Pontier, Ghazanfar F. Siddiqui, Johan F. ...
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...