Sciweavers

390 search results - page 62 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
PERVASIVE
2007
Springer
14 years 1 months ago
Intrusive and Non-intrusive Evaluation of Ambient Displays
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...
ICCHP
2004
Springer
14 years 1 months ago
Neuropsychological Function for Accessibility of Computer Program for People with Mental Retardation
The extent to which people with mental retardation are benefit from the modern information technology is not well explored. A better understanding on ways that the existing human-c...
Alex W. W. Wong, Chetwyn C. H. Chan, Cecilia W. P....
CHI
2009
ACM
14 years 8 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
JACM
2002
163views more  JACM 2002»
13 years 7 months ago
Formal verification of standards for distance vector routing protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: ...
Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gu...
CASSIS
2004
Springer
14 years 1 months ago
ESC/Java2: Uniting ESC/Java and JML
The ESC/Java tool was a lauded advance in effective static checking of realistic Java programs, but has become out-of-date with respect to Java and the Java Modeling Language (JML...
David R. Cok, Joseph Kiniry