Sciweavers

169 search results - page 18 / 34
» Malicious interface design: exploiting the user
Sort
View
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 7 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...
KI
2001
Springer
14 years 2 days ago
OilEd: A Reason-able Ontology Editor for the Semantic Web
Ontologies will play a pivotal rˆole in the “Semantic Web”, where they will provide a source of precisely defined terms that can be communicated across people and applicatio...
Sean Bechhofer, Ian Horrocks, Carole A. Goble, Rob...
IFIP
1999
Springer
13 years 12 months ago
Virtual environments in educational networks
: The field of Virtual Environments (VEs) is rapidly evolving into a new means of communication and accessing information, likely to overcome many existent technologies. However, b...
Christos Bouras, Agisilaos Konidaris, Afrodite Sev...
UIST
1992
ACM
13 years 11 months ago
Tools for Building Asynchronous Servers to Support Speech and Audio Applications
Distributed clientisewer models are becoming increasingly prevalent in multimedia systems and advanced user interface design. A multimedia application, for example, may play and r...
Barry Arons
ICMI
2004
Springer
120views Biometrics» more  ICMI 2004»
14 years 1 months ago
Support for input adaptability in the ICON toolkit
In this paper, we introduce input adaptability as the ability of an application to exploit alternative sets of input devices effectively and offer users a way of adapting input in...
Pierre Dragicevic, Jean-Daniel Fekete