Sciweavers

1891 search results - page 97 / 379
» Interactive Analysis of Computer Crimes
Sort
View
CHI
1993
ACM
14 years 2 months ago
A design space for multimodal systems: concurrent processing and data fusion
Multimodal interaction enables the user to employ different modalities such as voice, gesture and typing for communicating with a computer. This paper presents an analysis of the ...
Laurence Nigay, Joëlle Coutaz
ACSAC
2006
IEEE
14 years 4 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 4 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
SE
2007
13 years 11 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
FLAIRS
2004
13 years 11 months ago
An Active Architecture for Managing Events in Pervasive Computing Environments
Many dramatizations have depicted a fully automated home living environment, where actions and events are understood or even anticipated. While the realization of such environment...
Edwin Wong, Lisa J. Burnell, Charles Hannon