Sciweavers

7778 search results - page 1202 / 1556
» Designing Controllers for Reachability
Sort
View
CHI
2010
ACM
15 years 11 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
CHI
2010
ACM
15 years 11 months ago
Effects of interior bezels of tiled-monitor large displays on visual search, tunnel steering, and target selection
Tiled-monitor large displays are widely used in various application domains. However, how their interior bezels affect user performance and behavior has not been fully understood....
Xiaojun Bi, Seok-Hyung Bae, Ravin Balakrishnan
CCS
2010
ACM
15 years 11 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
15 years 11 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
EUROSEC
2009
ACM
15 years 11 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
« Prev « First page 1202 / 1556 Last » Next »