Sciweavers

2648 search results - page 84 / 530
» Human Factors In Computer Security
Sort
View
JCDL
2006
ACM
147views Education» more  JCDL 2006»
15 years 3 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
MHCI
2009
Springer
15 years 4 months ago
Hoverflow: exploring around-device interaction with IR distance sensors
By equipping a mobile device with distance sensing capabilities, we aim to expand the interaction possibilities of mobile and wearable devices beyond the confines of the physical ...
Sven G. Kratz, Michael Rohs
BMCBI
2007
103views more  BMCBI 2007»
14 years 10 months ago
Systems biology approach for mapping the response of human urothelial cells to infection by Enterococcus faecalis
Background: To better understand the response of urinary epithelial (urothelial) cells to Enterococcus faecalis, a uropathogen that exhibits resistance to multiple antibiotics, a ...
Mikhail G. Dozmorov, Kimberly D. Kyker, Ricardo Sa...
CHI
2007
ACM
15 years 10 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
WCRE
2005
IEEE
15 years 3 months ago
When Functions Change Their Names: Automatic Detection of Origin Relationships
It is a common understanding that identifying the same entity such as module, file, and function between revisions is important for software evolution related analysis. Most softw...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.