Sciweavers

2648 search results - page 134 / 530
» Human Factors In Computer Security
Sort
View
178
Voted
ACMACE
2007
ACM
15 years 9 months ago
Understanding social interaction in world of warcraft
Research has argued that social interaction is a primary driving force for gamers to continue to play Massive Multiple Online Role Playing Games (MMORPGs). However, one recent stu...
Vivian Hsueh-hua Chen, Henry Been-Lirn Duh
MHCI
2009
Springer
15 years 11 months ago
SeCuUI: autocomplete your terminal input
With SeCuUI we present a solution that aims to increase security of data entry on public terminals. The user can enter all data requested by the terminal using her mobile device. ...
Max-Emanuel Maurer, Alexander De Luca
151
Voted
HCI
2009
15 years 2 months ago
txteagle: Mobile Crowdsourcing
We present txteagle, a system that enables people to earn small amounts of money by completing simple tasks on their mobile phone for corporations who pay them in either airtime or...
Nathan Eagle
GIS
2009
ACM
16 years 6 months ago
Efficient and Secure Distribution of Massive Geo-Spatial Data
Modern geographic databases can contain a large volume of data that need to be distributed to subscribed customers. The data can be modeled as a cube, where typical dimensions inc...
Hao Yuan, Mikhail J. Atallah
156
Voted
PE
2008
Springer
167views Optimization» more  PE 2008»
15 years 5 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi