Sciweavers

13224 search results - page 128 / 2645
» Self-monitoring for Computer Users
Sort
View
CHI
2009
ACM
16 years 2 months ago
User-defined gestures for surface computing
Many surface computing prototypes have employed gestures created by system designers. Although such gestures are appropriate for early investigations, they are not necessarily ref...
Jacob O. Wobbrock, Meredith Ringel Morris, Andrew ...
DBSEC
2007
104views Database» more  DBSEC 2007»
15 years 3 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
106
Voted
CG
2006
Springer
15 years 1 months ago
Model-based user interface adaptation
Most work on model-based cross-platform user interface development is based on an assumption that the user interfaces on the different platforms should be as similar as possible. M...
Erik G. Nilsson, Jacqueline Floch, Svein O. Hallst...
SEUS
2009
IEEE
15 years 8 months ago
Using Context Awareness to Improve Quality of Information Retrieval in Pervasive Computing
Publish-subscribe-query information broker middleware offers great promise to users of pervasive computing systems requiring access to information. However, users of publish-subscr...
Joseph P. Loyall, Richard E. Schantz
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 8 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot