Sciweavers

2648 search results - page 3 / 530
» Human Factors In Computer Security
Sort
View
80
Voted
AGENTS
1999
Springer
15 years 1 months ago
Where to Look? Automating Attending Behaviors of Virtual Human Characters
This research proposes a computational framework for generating visual attending behavior in an embodied simulated human agent. Such behaviors directly control eye and head motion...
Sonu Chopra-Khullar, Norman I. Badler
ECTEL
2010
Springer
14 years 10 months ago
Content, Social, and Metacognitive Statements: An Empirical Study Comparing Human-Human and Human-Computer Tutorial Dialogue
Abstract. We present a study which compares human-human computermediated tutoring with two computer tutoring systems based on the same materials but differing in the type of feedba...
Myroslava Dzikovska, Natalie B. Steinhauser, Johan...
92
Voted
SOUPS
2010
ACM
15 years 1 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
88
Voted
SIGIR
2002
ACM
14 years 9 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny