Sciweavers

524 search results - page 74 / 105
» Why phishing works
Sort
View
BCSHCI
2008
15 years 1 months ago
Seeding without leading: making space for participant contribution in design elicitation techniques
As HCI embraces experience design, it will increasingly rely on new elicitation methods that are capable of drawing out the multi-faceted subjectivities of individuals without bei...
Ann Light, Pam Briggs, Karen Martin
DAIS
2008
15 years 1 months ago
A Comprehensive Context Modeling Framework for Pervasive Computing Systems
Context management in pervasive computing environments must reflect the specific characteristics of these environments, e.g. distribution, mobility, resource-constrained devices, o...
Roland Reichle, Michael Wagner, Mohammad Ullah Kha...
79
Voted
NIPS
2007
15 years 1 months ago
Hippocampal Contributions to Control: The Third Way
Recent experimental studies have focused on the specialization of different neural structures for different types of instrumental behavior. Recent theoretical work has provided no...
Máté Lengyel, Peter Dayan
AIM
2006
15 years 1 months ago
Developing a framework for analyzing IS/IT backsourcing
: Companies implementing an IS/IT backsourcing strategy (i.e. bringing IT functions back in-house after they have been outsourced) aiming at increasing operational effectiveness ma...
Jacky Akoka, Isabelle Comyn-Wattiau
ASC
2006
15 years 1 months ago
Supervised neuronal approaches for EEG signal classification: Experimental studies
Using artificial neural networks for Electroencephalogram (EEG) signal interpretation is a very challenging tasks for several reasons. The first class of reasons refers to the nat...
Frédéric Alexandre, Kerkeni Nizar, K...