Sciweavers

48 search results - page 9 / 10
» Hierarchical Organization of Certification Authorities for S...
Sort
View
HUC
2009
Springer
13 years 11 months ago
Understanding file access mechanisms for embedded Ubicomp collaboration interfaces
This paper explores the nature of interfaces to support people in accessing their files at tabletop displays embedded in the environment. To do this, we designed a study comparin...
Anthony Collins, Anastasia Bezerianos, Gregor McEw...
ISI
2007
Springer
14 years 1 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
CHI
2005
ACM
14 years 7 months ago
Supporting efficient development of cognitive models at multiple skill levels: exploring recent advances in constraint-based mod
This paper presents X-PRT, a new cognitive modeling tool supporting activities ranging from interface design to basic cognitive research. X-PRT provides a graphical model developm...
Irene Tollinger, Richard L. Lewis, Michael McCurdy...
ISI
2004
Springer
14 years 14 days ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
JCS
2010
104views more  JCS 2010»
13 years 5 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith