9,920 Hits in 7.9 sec

Crowdsourcing Accessibility: Human-Powered Access Technologies

Erin Brady, Jeffrey P. Bigham
2015 Foundations and Trends® in Human–Computer Interaction  
Sloan Foundation Fellowship, and by a grant from the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR) (#90DP0061-01-00).  ...  Based on how positive the feedback from the user is, volunteers are awarded points which are displayed on their personal profiles, indicating how many accessibility fixes they have contributed to.  ...  The deaf person would type (via a TTY device or later via IM), and a person at the relay office would convey the information to a hearing person.  ... 
doi:10.1561/1100000050 fatcat:m5nv2m55rnctndrgietkexypje

Access Control [chapter]

Anne Canteaut, Gerald Brose, Hakki C. Cankaya, Hakki C. Cankaya, Aaron Estes, Sabrina De Capitani di Vimercati, Sabrina De Capitani di Vimercati, Davide Martinenghi, Yvo Desmedt, Marijke De Soete, Alex Biryukov, Alex Biryukov (+36 others)
2011 Encyclopedia of Cryptography and Security  
MySpace A social networking Website offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music Nano One billion.  ...  Allows a user to access material in a nonlinear fashion, the primary requirement for developing hypertext.  ...  Web Master A person responsible for writing and maintaining a website. Web Portals A starting point for people surfing the internet.  ... 
doi:10.1007/978-1-4419-5906-5_179 fatcat:ibx7eeeyfrgmlfjprx3cnfuvkq

Access Method [chapter]

2017 Encyclopedia of GIS  
Model generalization is also called geodatabase abstraction, as it relates to generating a more simple digital representation of geometric objects in a database, leading to a considerable data reduction  ...  Synonyms Cartographic generalization; Conceptual generalization of databases; Geographic data reduction; Model generalization; Multiple resolution database Definition Model generalization is used to derive a  ...  The target user for the core of ArcGIS is the GIS professional (loosely defined as a career GIS staff person).  ... 
doi:10.1007/978-3-319-17885-1_100021 fatcat:ruj53dunmjhihjmn2svftoof2a

Towards User-Centric Intervention Adaptiveness: Influencing Behavior-Context based Healthy Lifestyle Interventions

Hafiz Syed Muhammad Bilal, Muhammad Bilal Amin, Jamil Hussain, Syed Imran Ali, Muahmmad Asif Razzaq, Musarrat Hussain, Asim Abbas Turi, Gwang Hoon Park, Sun Moo Kang, Sungyoung Lee
2020 IEEE Access  
No Context based personalized No No of a user for lifestyle assessment?  ...  The intermediate database comprises of lifelog, and profile information. B.  ...  We would also like to extend the scope of the study to include a wider user base such as the younger population having no prior health conditions. HAFIZ Laboratory.  ... 
doi:10.1109/access.2020.3026688 fatcat:svxynsdmrjfs3puss7izvg7ovi

Safeguarding innovation in the framework of sector-specific data access regimes: The case of digital payment services [chapter]

Jörg Hoffmann
2021 Data Access, Consumer Interests and Public Welfare  
This should not mean that sector-specific market regulation should deviate from a competition policy based regulatory approach.  ...  In the privacy discussion of the digital economy regarding personal data, one of the most heatedly debated issues is whether consumers as users of internet-based services are capable of making rational  ... 
doi:10.5771/9783748924999-343 fatcat:hk5qgcgq2zgf7cjx3innsp3vfq

LIPIcs : an Open-Access Series for International Conference Proceedings

Marc Herbstritt, Wolfgang Thomas
2016 ERCIM News  
Given a family with a missing person (MP), for whom there is no DNA sample, and given the availability of DNA profiles both of other family members and an unknown individual (UI), is UI equal to MP?  ...  Especially in the European Union, the right to be forgotten has remained in political discussion, especially fed by a legal base for protection of personal information on the Internet by the European Commission  ...  This calls for approaching security in a holistic manner.  ... 
doi:10.18154/rwth-2018-223393 fatcat:ddo7qz65l5b7peuksw2amaoxai

White Paper: EMPI Provides a Critical Foundation for Improving Access to Care

Lorraine Fernandes
2009 Healthcare Quarterly  
EMPI is a patient information and linking system used to identify patients on multiple waiting lists for the same procedure, thereby preventing duplication.  ...  Commentary Enterprise master person index (EMPI) technology is essential to the Wait Time Information System.  ...  medicine to a consumer-based approach" (Urowitz et al. 2008) .  ... 
doi:10.12927/hcq.2009.20753 fatcat:hu4pxjkxuvfqjorjbecihexmom

Toward Universal Access: Addressing the Global Challenge of Financial Inclusion [chapter]

Peer Stein, Bikki Randhawa, Nina Bilandzic, Alfred Hannig, Yongbeom Kim, Princess of the Netherlands Máxima
2010 Postcrisis Growth and Development  
They mandated a Financial Inclusion Experts Group to identify lessons learned about innovative approaches for improving access and to focus on access by SMEs.  ...  Finally, information and communication technologies are also contributing to expanding financial access across the world, facilitating connections between individual donors and poor people (person-to-person  ...  Historically, most microfinance clients were women, although this profile is changing as men make up an increasing portion of client portfolios, which are often also aimed at youth, children, and the very  ... 
doi:10.1596/9780821385180_ch10 fatcat:zgbdvgmjavfp5os6watqzkv2o4

Open Access Publishing: A Literature Review

Giancarlo F. Frosio
2014 Social Science Research Network  
106 For a discussion and collection of empirical data regarding the motivations, personal attributes and behavioural patterns of those who are engaged in producing free/libre and open source software (  ...  FLOSS), see Paul A David and Joseph Shapiro, 'Community-  ...  See also Thomas M Susman and David J Carter, 'Information Access Alliance, Publisher Mergers: A Consumer-Based Approach To Antitrust Analysis' (Information Access Alliance 2003)  ... 
doi:10.2139/ssrn.2697412 fatcat:po3pq3dhebcebme3loceef2fgq

Corbel Refined Organisational Competency Framework Needed By Distributed Ris At 3 Development Stages

Cath Brooksbank, Markus Pasterk
2016 Zenodo  
and maintain competency profiles for technical roles.  ...  management and integration, physical access, ethics and innovation – from within and beyond the BMS-RIs.  ...  that you have gained, and the evidence that you have gained them, in a competency portfolio you can seek further training to fill gaps in your portfolio, or map your existing portfolio to roles that you  ... 
doi:10.5281/zenodo.154085 fatcat:xfgojajzkvah3lxdkhfhfsxnsu

Enabling Open Access to Public Sector Information with Creative Commons Licences: The Australian Experience 1 [chapter]

Anne Fitzgerald, Neale Hooper, Brian Fitzgerald
2017 Copyright Law  
of a copyright-based, licensing approach for PSI has some distinct advantages that are not readily achievable otherwise.  ...  For example, the government agency could make a digital file available for access on a web site where it can be viewed but not copied by a user; however, if the user wants to proceed to download a licensed  ...  space for people to upload and download, create profiles, share, remix and build communities.  ... 
doi:10.4324/9781315095400-13 fatcat:mdqigvrh2nfz3hkpje7cwzmz5y

Changing spaces: writing centres and access to higher education

Caroline Malthus
2015 Higher Education Research and Development  
Acknowledgements Thanks to Maureen Robinson for reading this with a critical eye.  ...  What I say will be the personal view of someone now based in the UK whose reading of the book is inevitably shaped by her current context.  ...  allowed on the option to submit a summative portfolio for credit.  ... 
doi:10.1080/07294360.2015.1008119 fatcat:bacxv6uuijdtvleroviyicwnzu

TEFIS: A single access point for conducting multifaceted experiments on heterogeneous test facilities

M. Yannuzzi, M.S. Siddiqui, A. Sällström, B. Pickering, R. Serral-Gracià, A. Martínez, W. Chen, S. Taylor, F. Benbadis, J. Leguay, E. Borrelli, I. Ormaetxea (+14 others)
2014 Computer Networks  
More specifically, TEFIS offers a versatile combination of heterogeneous experimental facilities through "a single access point", and it is built as an open platform that currently provides seamless access  ...  (4) The Botnia Living Lab [6] (a Living Lab that offers end-user engagement in the design and testing of Future Internet technologies and services); (5) Kyatera [7] (a high-speed optical network for supporting  ...  Acknowledgements The authors are grateful for the support received from the rest of the researchers involved in the FP7 project TEFIS, contract no. 258142.  ... 
doi:10.1016/j.bjp.2013.12.030 fatcat:lkoejy5duzgi5lqxch7zeagr2q

Coordination, Property & Intellectual Property: An Unconventional Approach to Anticompetitive Effects & Downstream Access

F. Scott Kieff
2006 Social Science Research Network  
literature argues for the use of weaker, or liability rule, enforcement as a tool for solving the problems of anticompetitive effects and downstream access while still providing sufficient rewards to IP  ...  This paper takes an unconventional approach under which rewards don't matter much, but coordination does matter a great deal.  ...  allows the owners to shape the right based on the best information available at the time about its value, including the different parameters that will impact the value in different ways -for example,  ... 
doi:10.2139/ssrn.910656 fatcat:vkdzivqsujcntgvkamfxcb56wi

Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach

Il-Horn Hann, Kai-Lung Hui, Sang-Yong Tom Lee, Ivan P.L. Png
2007 Journal of Management Information Systems  
Finally, our approach also allows us to identify three distinct segments of Internet users -privacy guardians, information sellers, and convenience seekers.  ...  The advent of the Internet has made the transmission of personally identifiable information more common and often unintended by the user.  ...  The financial portal will provide either: No option to review your personal information for mistakes Option to review your personal information and correct mistakes 5. Improper Access.  ... 
doi:10.2753/mis0742-1222240202 fatcat:qj6yipfc3zf45bbel565ep6hga
« Previous Showing results 1 — 15 out of 9,920 results