Sciweavers

2399 search results - page 30 / 480
» On Authentication between Human and Computer
Sort
View
78
Voted
JCP
2007
117views more  JCP 2007»
14 years 9 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
INTERACT
2003
14 years 11 months ago
In Search of Resonant Human Computer Interaction: Building and Testing Aesthetic Installations
: Resonance (Gibson, 1986) of users while interacting with a product should be a key issue in the development of human computer interaction. Because resonance requires developing o...
Caroline Hummels, Philip R. Ross, Kees Overbeeke
IDTRUST
2010
ACM
15 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
PSYCHNOLOGY
2010
116views more  PSYCHNOLOGY 2010»
14 years 8 months ago
Social and Spatial Presence: An Application to Optimize Human-Computer Interaction
This study provides a framework for researchers who study human-computer interaction to develop and evaluate user-centric user-interfaces by applying existing theories about telep...
Karl Horvath, Matthew Lombard
BMCBI
2010
165views more  BMCBI 2010»
14 years 9 months ago
MTar: a computational microRNA target prediction architecture for human transcriptome
Background: MicroRNAs (miRNAs) play an essential task in gene regulatory networks by inhibiting the expression of target mRNAs. As their mRNA targets are genes involved in importa...
Vinod Chandra, Reshmi Girijadevi, Achuthsankar S. ...