Sciweavers

2648 search results - page 224 / 530
» Human Factors In Computer Security
Sort
View
ITICSE
2006
ACM
15 years 10 months ago
Peer teaching extends HCI learning
Crafting a good user experience requires skills in several disciplines. Few people have this breadth of knowledge, and undergraduate computer science students are no exception. En...
Beryl Plimmer, Robert Amor
WWW
2005
ACM
16 years 5 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...
WWW
2004
ACM
16 years 5 months ago
Using context- and content-based trust policies on the semantic web
The current discussion about a future Semantic Web trust architecture is focused on reputational trust mechanisms based on explicit trust ratings. What is often overlooked is the ...
Christian Bizer, Radoslaw Oldakowski
132
Voted
ASSETS
2006
ACM
15 years 10 months ago
Wireless headset communications for vision impaired persons in multi-User environments
Wireless headsets are a great asset to Vision Impaired Persons (VIP’s) as they prove to be much easier to use and reliable than wired equivalents. Radio based wireless headsets ...
Iain Murray, Andrew Pasquale
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer