Sciweavers

1636 search results - page 82 / 328
» From Usability Lab to
Sort
View
ACSAC
2006
IEEE
15 years 9 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
120
Voted
APN
2005
Springer
15 years 9 months ago
Continuization of Timed Petri Nets: From Performance Evaluation to Observation and Control
State explosion is a fundamental problem in the analysis and synthesis of discrete event systems. Continuous Petri nets can be seen as a relaxation of discrete models allowing more...
Manuel Silva, Laura Recalde
PERVASIVE
2005
Springer
15 years 9 months ago
Social Disclosure of Place: From Location Technology to Communication Practices
Communication of one’s location as part of a social discourse is common practice, and we use a variety of technologies to satisfy this need. This practice suggests a potentially ...
Ian E. Smith, Sunny Consolvo, Anthony LaMarca, Jef...
ACSAC
2002
IEEE
15 years 8 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
WMTE
2002
IEEE
15 years 8 months ago
Pattern-Based Annotations on E-Books: From Personal to Shared Didactic Content
Our research aims at defining models and software tools in order to provide learners with a training memory. This memory is a computer-based space where a learner can organize and...
Cyrille Desmoulins, Dominique Mille