Sciweavers

2648 search results - page 65 / 530
» Human Factors In Computer Security
Sort
View
MHCI
2009
Springer
15 years 4 months ago
Detecting physical shock by a mobile phone and its applications in security and emergency
In this paper, we propose a method for detecting physical shock by a mobile phone and its applications in security and emergency scenarios. We use acceleration signal provided by ...
Hamed Ketabdar
AIRWEB
2009
Springer
15 years 4 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
SIGCSE
2010
ACM
175views Education» more  SIGCSE 2010»
15 years 4 months ago
Compatibility of partnered students in computer science education
This paper details the results of an investigation into the compatibility of partnered computer science students. The study involved approximately 290 students at the University o...
Joshua Sennett, Mark Sherriff
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
Some research questions for computational transportation science
In this paper some research questions which potentially lie within the purview of the new discipline of Computational Transportation Science are presented. Some of these questions...
Glenn Geers
ISWC
2002
IEEE
15 years 2 months ago
Threat Response: A Compelling Application for Wearable Computing
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...