Sciweavers

3042 search results - page 75 / 609
» Designing for all users: including the odd users
Sort
View
LWA
2008
15 years 3 months ago
Capturing the needs of amateur web designers by means of examples
Many sites are created by people who lack professional training in web design. We present `SiteGuide', a tool that helps amateur web designers to decide which information wil...
Vera Hollink, Viktor de Boer, Maarten van Someren
SAC
2009
ACM
15 years 8 months ago
Development of a biosignals framework for usability analysis
The understanding of human physical and physiological signals and expressions, together with a growing processing and control capacity allows for new approaches in interactive sys...
Inês Oliveira, Rui Lopes, Nuno Guimarã...
INFOCOM
2012
IEEE
13 years 4 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 3 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
IEEECIT
2010
IEEE
14 years 11 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu