Sciweavers

2648 search results - page 482 / 530
» Human Factors In Computer Security
Sort
View
PETRA
2010
ACM
14 years 8 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
WWW
2004
ACM
15 years 10 months ago
Web accessibility: a broader view
Web accessibility is an important goal. However, most approaches to its attainment are based on unrealistic economic models in which Web content developers spend too much and rece...
John T. Richards, Vicki L. Hanson
MOBISYS
2007
ACM
15 years 9 months ago
Context-for-wireless: context-sensitive energy-efficient wireless data transfer
Ubiquitous connectivity on mobile devices will enable numerous new applications in healthcare and multimedia. We set out to check how close we are towards ubiquitous connectivity ...
Ahmad Rahmati, Lin Zhong
GROUP
2009
ACM
15 years 4 months ago
WaterCooler: exploring an organization through enterprise social media
As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people wit...
Michael J. Brzozowski
GROUP
2009
ACM
15 years 4 months ago
Effects of feedback and peer pressure on contributions to enterprise social media
Increasingly, large organizations are experimenting with internal social media (e.g., blogs, forums) as a platform for widespread distributed collaboration. Contributions to their...
Michael J. Brzozowski, Thomas Sandholm, Tad Hogg