搜索结果: 1-15 共查到“Users”相关记录109条 . 查询时间(0.109 秒)
2023年5月26日下午,“南开旅游大讲堂(第197期)——院长论坛”在学院111多功能厅顺利举行。应南开大学旅游与服务学院邀请,哈尔滨工业大学经济与管理学院副院长张紫琼教授为南开大学旅游与服务学院师生带来了“Smart Users:Effort Management in Earning Rewards”的精彩讲座。南开大学旅游与服务学院院长、青年教师、博士后和硕博研究生等共计50余人参加了此次...
New smartwatch app alerts deaf and hard-of-hearing users to common home-related sounds(图)
smartwatch app alerts deaf hard-of-hearing home-related sounds
2020/11/13
Smartwatches offer people a private method for getting notifications about their surroundings -- such as a phone call, health alerts or an upcoming package delivery.Now University of Washington resear...
VIRTUAL REALITY TO ALLOW WHEELCHAIR USERS TOURING COMPLEX ARCHAEOLOGICAL SITES IN A REALISTIC MANNER. TOWARDS THEIR ACTUAL SOCIAL INTEGRATION
Virtual Reality Digital Cultural Heritage Disabled People
2019/3/4
Technology development really reaches its highest point when it becomes a tool to facilitate life to people, especially to those more disadvantaged groups. This is the case of people with disabilities...
The Security of Lazy Users in Out-of-Band Authentication
out-of-band messaging authentication
2018/11/19
Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on "out-of-band'' authentication, assuming that users have access to an external channel for authenticating one shor...
Period tracking apps failing users in basic ways,study finds
tracking apps failing users basic ways
2017/7/19
A new study finds that smartphone apps to track menstrual cycles often disappoint users with a lack of accuracy, assumptions about sexual identity or partners, and an emphasis on pink and flowery form...
Device Allows Users to Manipulate 3-D Virtual Objects More Quickly
Device Allows Users Manipulate 3-D Virtual Objects More Quickly
2017/7/19
Researchers at North Carolina State University have developed a user-friendly, inexpensive controller for manipulating virtual objects in a computer program in three dimensions. The device allows user...
Novel technique tracks more web users across browsers
Novel technique tracks more web users across browsers
2017/3/13
For good or ill, what users do on the web is tracked. Banks track users as an authentication technique, to offer their customers enhanced security protection. Retailers track customers and potential c...
Tumble! Splat! Helping Users Access and Manipulate Occluded Content in 2D Drawings
Layer management 2D drawing occlusion interaction technique
2016/5/24
Accessing and manipulating occluded content in layered 2D drawings
can be difficult. This paper characterizes a design space of
techniques that facilitate access to occluded content. In addition,
w...
What users should know about Full Disk Encryption based on LUKS
Linux Unified Key Setup (LUKS) Password-Based Key Derivation Function 2 (PBKDF2) Full Disk Encryption (FDE)
2016/3/11
Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could reveal business secrets...
Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks
Influential mobile users random walks distributed protocol disease control information dissemination
2016/1/23
In this paper, we study the problem of identifying influen-tial users in mobile social networks. Traditional approaches find these users through centralized algorithms on either friendship or social-c...
CONIKS: Bringing Key Transparency to End Users
Public key verification key transparency end-to-end secure communication
2016/1/5
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates bu...
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
revocation privacy anonymous credentials
2016/1/3
Attribute-based credentials allow a user to prove properties about herself
anonymously. Revoking such credentials, which requires singling them out,
is hard because it is at odds with anonymity. All...
Towards Creating a Dialogue Between the Specialized Technician and non Technician Users of the 3D Laser Scanner
Laser scanning Generalization Recording Simplification Accuracy User Understanding Point Cloud
2015/11/13
Several attempts and case studies had been conducted to document the cultural heritage using the 3D Laser scanner in the last few years. Now, it is possible to furnish a virtual model of an object fro...