Sciweavers

1444 search results - page 47 / 289
» The end of users
Sort
View
ICIW
2009
IEEE
15 years 4 months ago
Dynamic Composition of Service-Oriented Web User Interfaces
So far, little research has addressed reuse and contextawareness with respect to rich web-based user interfaces. Uniform models for encapsulation and reuse have been developed for...
Stefan Pietschmann, Martin Voigt, Klaus Meiß...
KES
2007
Springer
15 years 3 months ago
Conceptual Enrichment of Locations Pointed Out by the User
Abstract. The growing availability of GPS and localization technologies in general opens up new challenges regarding the use of position information for Location Based Services. As...
Ana O. Alves, Raquel Hervás, Francisco C. P...
IICS
2001
Springer
15 years 2 months ago
Reusing Single-User Applications to Create Multi-user Internet Applications
Although there are many groupware platforms existing nowadays, collaborative multi-user applications are not yet widely accepted by end-users. In contrast to single-user applicatio...
Stephan Lukosch, Jörg Roth
COMPSEC
2004
156views more  COMPSEC 2004»
14 years 9 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
CNSM
2010
14 years 1 months ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...