Sciweavers

2940 search results - page 585 / 588
» Towards Social Information Systems
Sort
View
MHCI
2005
Springer
15 years 3 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...
VRST
2004
ACM
15 years 3 months ago
Observing effects of attention on presence with fMRI
Presence is one of the goals of many virtual reality systems. Historically, in the context of virtual reality, the concept of presence has been associated much with spatial percep...
Sungkil Lee, Gerard Jounghyun Kim, Janghan Lee
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 3 months ago
No More Shadow Boxing with Online Music Piracy: Strategic Business Models to Enhance Revenues
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anony...
Sudip Bhattacharjee, Ram D. Gopal, Kaveepan Lertwa...
IUI
2003
ACM
15 years 3 months ago
Evolution of user interaction: the case of agent adele
Animated pedagogical agents offer promise as a means of making computer-aided learning more engaging and effective. To achieve this, an agent must be able to interact with the lea...
W. Lewis Johnson, Erin Shaw, Andrew Marshall, Cath...
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 1 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig