Results 271 to 280 of about 5,175,775 (316)
Some of the next articles are maybe not open access.

User Equilibrium with Length Constrained Users

2012 Fifth International Joint Conference on Computational Sciences and Optimization, 2012
In this paper we introduce a length constrained user equilibrium model. In our model, people consider two criteria, path time and path length, when selecting their routes. They only travel on "acceptable paths", the paths whose length are not too long for them.
Bojian Zhou, Xuhong Li
openaire   +1 more source

Understanding the User

Proceedings of the 2017 ACM Symposium on Document Engineering, 2017
Document engineering is all about building systems and tools that allow people to work with documents and document collections. A key aspect is the usefulness and usability of these tools. In this tutorial, we will look at the many different kinds of user studies and user evaluations that can be used to inform the design and improve utility and ...
Kim Marriott   +2 more
openaire   +1 more source

A Comparison of Marijuana Users and Non-users

Nature, 1970
Interviews with sixty-two Americans in their twenties, mostly students, demonstrate that those who smoked marijuana moderately differed little in personality from those who did not indulge, but that heavy smokers of marijuana were rather less conventional. The smokers tended to drink little alcohol.
N E, Zinberg, A T, Weil
openaire   +2 more sources

User cube: a taxonomy of end users

Communications of the ACM, 1989
The user cube, a precise and comprehensive graphical taxonomy designed to provide a common base for understanding and classifying end users in organizations, can be used to assess the risks associated with end-user computing.
William W. Cotterman, Kuldeep Kumar
openaire   +1 more source

User Authentication Based on Representative Users

IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2012
User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking since stolen usernames and passwords can be exploited to impersonate legitimate users in order to commit malicious activity. Biometric authentication incorporates additional user characteristics such
Alon Schclar   +3 more
openaire   +1 more source

User involvement and user satisfaction

Information and Management, 1993
Kwasi Amoako-Gyampah
exaly   +2 more sources

The proximity of users to user services

Proceedings of the 5th annual ACM SIGUCCS conference on User services - SIGUCCS '77, 1977
The title of this paper is a purposeful misreading of a suggested topic that is designed to stress a major fact of CUNY/UCC life. The City University of New York consists of 21 individual units scattered throughout the five boroughs of New York City with a total constituency of 250,000 people.
openaire   +1 more source

User services and statistical users

Proceedings of the 5th annual ACM SIGUCCS conference on User services - SIGUCCS '77, 1977
Universities, over the past decade, have seen a shift to empirical research in the social sciences, and to some extent, in the humanities. The origins of this trend are irrelevant here, but the refinement of statistical analysis packages in response to the new market has had a powerful impact on university computing centers. Computing has become a tool
Kathleen Cook, David Weible
openaire   +1 more source

Adnosco: trace user data for the user. [PDF]

open access: possible, 2014
The development of the web has seen the explosion of web forms as a mean for the user to provideinformation to web applications in the context of both personal and professional activities.Currently, user personal data are stored and managed at companies’ side.
Bennani, Nadia   +3 more
openaire   +1 more source

User Property, User Rights, and User Privileges

2017
This chapter proposes two principles that should inform the development of copyright law and policy and of user rights. The first calls for more cohesion between copyright law, private law, and public law, and for less exceptionalism in copyright law.
openaire   +1 more source

Home - About - Disclaimer - Privacy