Sciweavers

1818 search results - page 264 / 364
» How users use access control
Sort
View
ACL
1998
15 years 5 months ago
Evaluating Response Strategies in a Web-Based Spoken Dialogue Agent
While the notion of a cooperative response has been the focus of considerable research in natural language dialogue systems, there has been little empirical work demonstrating how...
Diane J. Litman, Shimei Pan, Marilyn A. Walker
ASSETS
2006
ACM
15 years 10 months ago
Dynamically adapting GUIs to diverse input devices
Many of today’s desktop applications are designed for use with a pointing device and keyboard. Someone with a disability, or in a unique environment, may not be able to use one ...
Scott Carter, Amy Hurst, Jennifer Mankoff, Jack Li
MM
2005
ACM
112views Multimedia» more  MM 2005»
15 years 9 months ago
MediaMill: exploring news video archives based on learned semantics
In this technical demonstration we showcase the MediaMill system. A search engine that facilitates access to news video archives at a semantic level. The core of the system is an ...
Cees Snoek, Marcel Worring, Jan van Gemert, Jan-Ma...
ICCE
2007
114views Education» more  ICCE 2007»
15 years 5 months ago
Investigating the Reuse of Course Generation Knowledge
: Course generation knowledge, i.e., how to assemble a sequence of learning objects which is adapted to a learner’s goals, competencies and preferences, is hard to assess and exp...
Carsten Ullrich, Qinghua Chen, Sushing Chen, Lipin...
CCS
2007
ACM
15 years 10 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...