Sciweavers

1516 search results - page 281 / 304
» How Open is e-Science
Sort
View
UIST
1997
ACM
13 years 11 months ago
Usability Analysis of 3D Rotation Techniques
We report results from a formal user study of interactive 3D rotation using the mouse-driven Virtual Sphere and Arcball techniques, as well as multidimensional input techniques ba...
Ken Hinckley, Joe Tullio, Randy F. Pausch, Dennis ...
MOBICOM
1996
ACM
13 years 11 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
LPKR
1997
Springer
13 years 11 months ago
Generalizing Updates: From Models to Programs
Abstract. Recently the field of theory update has seen some improvement, in what concerns model updating, by allowing updates to be specified by so-called revision programs. The ...
João Alexandre Leite, Luís Moniz Per...
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
13 years 11 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
CHI
1994
ACM
13 years 11 months ago
User interface tools
A user interface software tool helps developers design and implement the user interface. Research on past tools has had enormous impact on today's developers--virtually all a...
Brad A. Myers, Dan R. Olsen