Sciweavers

2648 search results - page 335 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 8 months ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford
136
Voted
AUTOMOTIVEUI
2009
ACM
15 years 8 months ago
Driver behaviour during haptic and visual secondary tasks
There has been an increasing interest for in-vehicle interfaces that make use of haptic information. A simulator study was conducted to investigate whether haptic information can ...
Annie Rydström, Camilla Grane, Peter Bengtsso...
158
Voted
ASSETS
2007
ACM
15 years 7 months ago
Automated tactile graphics translation: in the field
We address the practical problem of automating the process of translating figures from mathematics, science, and engineering textbooks to a tactile form suitable for blind student...
Chandrika Jayant, Matthew Renzelmann, Dana Wen, Sa...
DIM
2007
ACM
15 years 7 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
128
Voted
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
15 years 7 months ago
Autonomous evolutionary music composer
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...
Yaser M. A. Khalifa, Mohamed Basel Al-Mourad