Sciweavers

1848 search results - page 226 / 370
» A Question Answering System for the Operation of Software Ap...
Sort
View
UIST
1997
ACM
14 years 1 months ago
Pen-Based Interaction Techniques for Organizing Material on an Electronic Whiteboard
This paper presents a scheme for extending an informal, penbased whiteboard system (the Tivoli application on the Xerox LiveBoard) to provide interaction techniques that enable gr...
Thomas P. Moran, Patrick Chiu, William van Melle
CASES
2006
ACM
14 years 3 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
SACMAT
2009
ACM
14 years 3 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
CHI
1993
ACM
14 years 1 months ago
An evaluation of earcons for use in auditory human-computer interfaces
An evaluation of earcons was carried out to see whether they are an effective means of communicating information in sound. An initial experiment showed that earcons were better th...
Stephen A. Brewster, Peter C. Wright, Alistair D. ...
ESSOS
2011
Springer
13 years 22 days ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...