Sciweavers

578 search results - page 112 / 116
» Making PRIME usable
Sort
View
EUROCRYPT
2008
Springer
13 years 9 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
BCSHCI
2008
13 years 9 months ago
Assessing the benefits of multimodal feedback on dual-task performance under demanding conditions
The last few years have seen the release of an increasing number of new IT-related devices into the marketplace that have started to utilize tactile feedback. These include those ...
Ju-Hwan Lee, Charles Spence
AVI
2004
13 years 9 months ago
A visual tool for tracing users' behavior in Virtual Environments
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
Luca Chittaro, Lucio Ieronutti
IPCC
1998
92views more  IPCC 1998»
13 years 9 months ago
Evaluating Distance Learning in Graduate Programs: Ensuring Rigorous, Rewarding Professional Education
: Internet-based distance learning programs make it possible for technical communicators located anywhere in the world to participate in graduate courses in their field. But are th...
George F. Hayhoe
SOFTVIS
2010
ACM
13 years 7 months ago
An interactive ambient visualization for code smells
Code smells are characteristics of software that indicate that code may have a design problem. Code smells have been proposed as a way for programmers to recognize the need for re...
Emerson R. Murphy-Hill, Andrew P. Black