Sciweavers

931 search results - page 85 / 187
» Management of personal information scraps
Sort
View
CIKM
2001
Springer
15 years 6 months ago
Discovering the Representative of a Search Engine
Given a large number of search engines on the Internet, it is di cult for a person to determine which search engines could serve his/her information needs. A common solution is to...
King-Lup Liu, Clement T. Yu, Weiyi Meng, Adrian Sa...
CHI
2009
ACM
16 years 2 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
ICALP
2009
Springer
15 years 8 months ago
Assigning Papers to Referees
Refereed conferences require every submission to be reviewed by members of a program committee (PC) in charge of selecting the conference program. There are many software packages...
Kurt Mehlhorn
UCS
2004
Springer
15 years 6 months ago
Realizing a Secure Federation of Multi-institutional Service Systems
Abstract. This paper proposes an extended framework for service provision for ubiquitous spaces based on Kerberos. The framework allows groups of services and information about ord...
Yu Enokibori, Nobuhiko Nishio
AUIC
2004
IEEE
15 years 5 months ago
e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces
Ubiquitous workspaces are future media-rich environments that employ new forms of operating systems and services to coordinate and manage interactions between people, multiple dis...
Michael Vernik, Steven Johnson, Rudi Vernik