Sciweavers

163 search results - page 22 / 33
» Putting Users in Control of their Recommendations
Sort
View
CCS
2008
ACM
15 years 11 days ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
102
Voted
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
15 years 3 months ago
Digital Documents and Media
People need to find, work with, and put together information. Diverse activities, such as scholarly research, comparison shopping, and entertainment involve collecting and connect...
Michael A. Shepherd
CHI
2007
ACM
15 years 2 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
FLAIRS
2006
14 years 11 months ago
Introspective Subgroup Analysis for Interactive Knowledge Refinement
When knowledge systems are deployed into a real-world application, then the maintenance and the refinement of the knowledge are essential tasks. Many existing automatic knowledge ...
Martin Atzmüller, Joachim Baumeister, Frank P...
BCSHCI
2009
14 years 11 months ago
An evaluation of a meal planning system: ease of use and perceived usefulness
Unhealthy eating is an increasingly important problem in the western society. Our approach to this problem is to provide a meal planning system giving recommendations of suitable ...
Johan Aberg