Sciweavers

2648 search results - page 521 / 530
» Human Factors In Computer Security
Sort
View
DOLAP
2006
ACM
15 years 1 months ago
Building a web warehouse for accessibility data
As more and more information is available on the web, it is a problem that many web resources are not accessible, i.e., are not usable for users with special needs. For example, f...
Christian Thomsen, Torben Bach Pedersen
ASSETS
2008
ACM
14 years 11 months ago
Software and technologies designed for people with autism: what do users want?
Software developers, designers and researchers have been looking to technology for solutions to help and educate people with autism for over two decades. There are many examples o...
Cynthia Putnam, Lorna Chong
69
Voted
CIKM
2008
Springer
14 years 11 months ago
Similarity cross-analysis of tag / co-tag spaces in social classification systems
Recent growth of social classification systems due to steadily increasing popularity has established a multitude of heterogeneous isolated, non-integrated, and non-interoperable t...
Steffen Oldenburg, Martin Garbe, Clemens H. Cap
ECLIPSE
2005
ACM
14 years 11 months ago
Bridging the gap between technical and social dependencies with Ariadne
One of the reasons why large-scale software development is difficult is the number of dependencies that software engineers need to face: e.g., dependencies among the software comp...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
CIVR
2008
Springer
239views Image Analysis» more  CIVR 2008»
14 years 11 months ago
Analyzing Flickr groups
There is an explosion of community-generated multimedia content available online. In particular, Flickr constitutes a 200-million photo sharing system where users participate foll...
Radu Andrei Negoescu, Daniel Gatica-Perez