Sciweavers

592 search results - page 2 / 119
» Learning of personalized security settings
Sort
View
ICALT
2007
IEEE
13 years 11 months ago
Visualizing Narrative Structures and Learning Style Information in Personalized e-Learning Systems
This paper proposes a novel approach to the visualization of complex, but interrelated, sets of information to ease user cognition. Principally, it explores the potential of provi...
Fionán Peter Williams, Owen Conlan
CCS
2010
ACM
13 years 5 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
IDTRUST
2009
ACM
14 years 5 days ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
CVPR
2011
IEEE
12 years 9 months ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia
SOUPS
2005
ACM
13 years 11 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...