Sciweavers

2503 search results - page 454 / 501
» Building Computer Network Attacks
Sort
View
GRAPHICSINTERFACE
2009
13 years 6 months ago
Sketch-based path design
We present Drive, a system for the conceptual layout of 3D path networks. Our sketch-based interface allows users to efficiently author path layouts with minimal instruction. Our ...
James McCrae, Karan Singh
HCI
2009
13 years 6 months ago
Social Adaptation of ERP Software: Tagging UI Elements
Abstract. In this paper we present a newly designed annotation and collaboration component, which has been prototypically implemented on top of an ERP (Enterprise Resource Planning...
Marcus Nitsche, Martin Christof Kindsmüller, ...
ACMDIS
2010
ACM
13 years 4 months ago
Human-to-dancer interaction: designing for embodied performances in a participatory installation
In this article we describe the creation and exhibit of a participatory installation performance. Graffiti Dance allows the audience to graffiti paint with light onto a buildings ...
David A. Shamma, Renata M. Sheppard, Jürgen S...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
RTCSA
2006
IEEE
14 years 3 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son