Sciweavers

149 search results - page 16 / 30
» Understanding the Evolution of Users' Personal Information M...
Sort
View
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
15 years 4 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi
SOSP
2003
ACM
15 years 8 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
HICSS
2011
IEEE
261views Biometrics» more  HICSS 2011»
14 years 3 months ago
Improved Patient Outcomes through Collaborative Monitoring and Management of Subtle Behavioral and Physiological Health Changes
This paper describes a highly mobile collaborative patient-centric, self-monitoring, symptom recognition and self intervention system along with a complementary clinical nursing t...
Paul J. Fortier, Brendon Puntin, Osama Aljaroudi
CHI
2009
ACM
16 years 9 days ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
ATAL
2003
Springer
15 years 5 months ago
Searching social networks
A referral system is a multiagent system whose member agents are capable of giving and following referrals. The specific cases of interest arise where each agent has a user. The ...
Bin Yu, Munindar P. Singh