Sciweavers

13224 search results - page 83 / 2645
» Self-monitoring for Computer Users
Sort
View
149
Voted
ICDCS
2011
IEEE
14 years 1 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
WINET
2002
169views more  WINET 2002»
15 years 1 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
CSL
2011
Springer
14 years 8 months ago
Detecting emotional state of a child in a conversational computer game
The automatic recognition of user’s communicative style within a spoken dialog system framework, including the affective aspects, has received increased attention in the past f...
Serdar Yildirim, Shrikanth Narayanan, Alexandros P...
101
Voted
CHI
2011
ACM
14 years 5 months ago
Computers can't give credit: how automatic attribution falls short in an online remixing community
In this paper, we explore the role that attribution plays in shaping user reactions to content reuse, or remixing, in a large user-generated content community. We present two stud...
Andrés Monroy-Hernández, Benjamin Ma...
UML
2005
Springer
15 years 7 months ago
Capturing Common and Variable Design Aspects for Ubiquitous Computing with MB-UID
Developing user interfaces for ubiquitous environments is a challenging task. In such an environment, users can apply different devices to accomplish the same or different tasks. ...
Alexander Boedcher, Kizito Mukasa, Detlef Zuelke