Sciweavers

2648 search results - page 222 / 530
» Human Factors In Computer Security
Sort
View
ISWC
2003
IEEE
15 years 9 months ago
Effects of Functionality on Perceived Comfort of Wearables
This paper presents results from a study examining the link between the functionality and the comfort of wearable computers. We gave participants two different devices to wear and...
Kerry Bodine, Francine Gemperle
GROUP
2007
ACM
15 years 8 months ago
The gospel of knowledge management in and out of a professional community
Knowledge management (KM) remains an anomaly in most corporations today. Critics call KM a fad of the 1990s, whereas supporters claim KM is actively evolving. Our work examines th...
Norman Makoto Su, Hiroko Wilensky, David F. Redmil...
NSDI
2008
15 years 6 months ago
Paper Rating vs. Paper Ranking
Within the computer-science community, submitted conference papers are typically evaluated by means of rating, in two respects: First, individual reviewers are asked to provide th...
John R. Douceur
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 11 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
ICPR
2008
IEEE
16 years 5 months ago
How to make iris recognition easier?
Iris recognition is regarded as the most reliable biometrics and has been widely applied in both public and personal security areas. However users have to highly cooperate with th...
Tieniu Tan, Wenbo Dong, Zhenan Sun