Sciweavers

1444 search results - page 174 / 289
» The end of users
Sort
View
FC
2007
Springer
106views Cryptology» more  FC 2007»
15 years 4 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
61
Voted
AVI
2004
14 years 11 months ago
Usability studies on a visualisation for parallel display and control of alternative scenarios
Many applications require comparison between alternative scenarios; most support it poorly. A subjunctive interface supports comparison through its facilities for parallel setup, ...
Aran Lunzer, Kasper Hornbæk
UIST
2005
ACM
15 years 3 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
HUC
2004
Springer
15 years 3 months ago
Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services
We present an automated transportation routing system, called “Opportunity Knocks,” whose goal is to improve the efficiency, safety and independence of individuals with mild co...
Donald J. Patterson, Lin Liao, Krzysztof Gajos, Mi...
83
Voted
CAISE
2005
Springer
15 years 3 months ago
Query Processing Using Ontologies
Abstract. Recently, the database and AI research communities have paid increased attention to ontologies. The main motivating reason is that ontologies promise solutions for comple...
Chokri Ben Necib, Johann Christoph Freytag