Sciweavers

1444 search results - page 174 / 289
» The end of users
Sort
View
91
Voted
FC
2007
Springer
106views Cryptology» more  FC 2007»
15 years 6 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
76
Voted
AVI
2004
15 years 2 months ago
Usability studies on a visualisation for parallel display and control of alternative scenarios
Many applications require comparison between alternative scenarios; most support it poorly. A subjunctive interface supports comparison through its facilities for parallel setup, ...
Aran Lunzer, Kasper Hornbæk
97
Voted
UIST
2005
ACM
15 years 6 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
94
Voted
HUC
2004
Springer
15 years 6 months ago
Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services
We present an automated transportation routing system, called “Opportunity Knocks,” whose goal is to improve the efficiency, safety and independence of individuals with mild co...
Donald J. Patterson, Lin Liao, Krzysztof Gajos, Mi...
CAISE
2005
Springer
15 years 6 months ago
Query Processing Using Ontologies
Abstract. Recently, the database and AI research communities have paid increased attention to ontologies. The main motivating reason is that ontologies promise solutions for comple...
Chokri Ben Necib, Johann Christoph Freytag