Browsing UMBC Information Systems Department by Title
Now showing items 156-175 of 304
-
An investigation of ways to support older adults when using mobile interfaces
(iConference, 2017-07-27)In this paper, we describe a study designed to examine the effects of modality, target size and other design features on task performance. The study has specifically focused on older adults when accessing a mobile interface. ... -
IP Reputation Scoring with Geo-Contextual Feature Augmentation
(ACM, 2020-10)The focus of this article is to present an effective anomaly detection model for an encrypted network session by developing a novel IP reputation scoring model that labels the incoming session IP address based on the most ... -
Is Bigger Better When It Comes to Android Graphical Pattern Unlock?
(IEEE, 2017-11-20)Android unlock patterns are likely the most prevalent graphical password system to date. However, human-chosen authentication stimuli (such as text passwords and PINs) are easy to guess. Does increasing the grid size from ... -
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock
(Association for Computing Machinery, 2015-12)Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3x3 grid. Prior studies demonstrated that human-generated ... -
Iterative Signal Separation Assisted Energy Disaggregation
(IEEE, 2016-01-28)Providing itemized energy consumption in a utility bill is becoming a priority, and perhaps a business practice in the near term. In recent times, a multitude of systems have been developed such as smart plugs, smart circuit ... -
“It’s all about the start” classifying eyes-free mobile authentication techniques
(Elsevier, 2018-06-13)Mobile device users avoiding observational attacks and coping with situational impairments may employ techniques for eyes-free mobile unlock authentication, where a user enters his/her passcode without looking at the device. ... -
Knowledge Co-Creation and Assistive Technology
(Scholarly and Research Communication, 2014-10-06)This article presents reflections from the perspective of two computer science researchers who have used knowledge mobilization services (as opposed to technology transfer services) in service of research goals that arose ... -
A Knowledge Representation of Cloud Data controls for EU GDPR Compliance
(IEEE, 2018-07-06)The rollout of European Union’s General Data Protection Regulation (EU GDPR) will have a far-reaching effect on Cloud data privacy and compliance for both the Cloud Service Providers (Data Providers) and the Consumers (Data ... -
LASO: Exploiting Locomotive and Acoustic Signatures over the Edge to Annotate IMU Data for Human Activity Recognition
Annotated IMU sensor data from smart devices and wearables are essential for developing supervised models for fine-grained human activity recognition, albeit generating sufficient annotated data for diverse human activities ... -
Lessons Learned Creating Youth Jobs in an Afterschool Maker Space
(American Society for Engineering Education (ASEE), 2017) -
Leveraging Mobile Sensing to Understand and Develop Intervention Strategies to Improve Medication Adherence
(IEEE, 2020-06-26)Interventions to improve the medication adherence have had limited success and can require significant human resources to implement. Research focused on improving medication adherence has undergone a paradigm shift, of ... -
A Linearized Viscous, Compressible Flow-Plate Interaction with Non-dissipative Coupling
We address semigroup well-posedness for a linear, compressible viscous fluid interacting at its boundary with an elastic plate. We derive the model by linearizing the compressible Navier-Stokes equations about an arbitrary ... -
Link before you share: Managing privacy policies through blockchain
(IEEE, 2018-01-15)With the advent of numerous online content providers, utilities and applications, each with their own specific version of privacy policies and its associated overhead, it is becoming increasingly difficult for concerned ... -
Longitudinal Energy Waste Detection with Visualization
(ACM, 2017-11-08)Leaky windows and doors, open refrigerators, unattended appliances, left-on lights, and other sources subtly leak energy accounting for a large portion of waste. Formal energy audits are expensive and time consuming and ... -
A Longitudinal Pilot Study to Evaluate Non-Visual Icons in a Mobile Exertion Application
(Springer, Berlin, Heidelberg, 2011)This paper describes an evaluation of a mobile exertion application, developed to promote physical activity among adult users. To extend previous work, we aimed to identify changes in walking behavior over time, and to ... -
Machine Learning Based Algorithms for Global Dust Aerosol Detection From Satellite Images: Inter-Comparisons and Evaluation
(2020-12-08)Identifying dust aerosols from passive satellite images is of great interest for many applications. In this study, we developed 5 different machine-learning (ML) and deep-learning (DL) based algorithms, including Logistic ... -
Maintaining levels of activity using a haptic personal training application
(Association for Computing Machinery, 2010-04)This paper describes the development of a novel mobile phone-based application designed to monitor the walking habits of older adults. Haptic cues integrated within the prototype, are designed to inform an individual of ... -
Makers with a Cause: Fabrication, Reflection and Community Collaboration
(Springer Nature, 2015-07-22)The potential of using maker and DIY approaches for collaborative learning is widely recognized. Maker techniques such as rapid prototyping are being increasingly adopted by schools, universities and colleges in order to ... -
Managing Cloud Storage Obliviously
(IEEE, 2017-01-19)Consumers want to ensure that their enterprise data is stored securely and obliviously on the cloud, such that the data objects or their access patterns are not revealed to anyone, including the cloud provider, in the ...