Sciweavers

2648 search results - page 85 / 530
» Human Factors In Computer Security
Sort
View
CHI
2005
ACM
15 years 10 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
FDG
2009
ACM
15 years 4 months ago
Relating cognitive models of computer games to user evaluations of entertainment
As the interactive entertainment industry matures, a better understanding of what makes software entertaining is needed. A natural starting point is the application of traditional...
Paolo Piselli, Mark Claypool, James Doyle
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
15 years 4 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
TKDE
2008
134views more  TKDE 2008»
14 years 9 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
HRI
2009
ACM
15 years 4 months ago
Robot motivator: improving user performance on a physical/mental task
We describe the design and implementation of a socially assistive robot that is able to monitor the performance of a user during a combined mental and physical task, with the purp...
Juan Fasola, Maja J. Mataric