Sciweavers

169 search results - page 5 / 34
» Malicious interface design: exploiting the user
Sort
View
INTERACT
2007
13 years 9 months ago
Model-Driven Adaptation for Plastic User Interfaces
User Interface (UI) plasticity denotes UI adaptation to the context of use (user, platform, physical and social environments) while preserving usability. In this article, we focus ...
Jean-Sebastien Sottet, Vincent Ganneau, Gaëll...
ISM
2005
IEEE
112views Multimedia» more  ISM 2005»
14 years 1 months ago
Automatically Generating User Interfaces for Device Federations
One of the ideas of ubiquitous computing is that computing resources should be embedded ubiquitously in the environment, making them available to any nearby users. Some researcher...
Elmar Braun, Max Mühlhäuser
CCS
2011
ACM
12 years 7 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
HCI
2009
13 years 5 months ago
Context-Aware Cognitive Agent Architecture for Ambient User Interfaces
An ambient user interface is a set of hidden intelligent interfaces that recognize user's presence and provides services to immediate needs. There are several research activit...
Youngho Lee, Choonsung Shin, Woontack Woo
UCS
2004
Springer
14 years 27 days ago
A Unified Application Service Model for ubiHome by Exploiting Intelligent Context-Awareness
Abstract. We propose a unified ubiHome application service model which provides user-centered services by exploiting intelligent context-awareness. Recently, most of research relat...
Yoosoo Oh, Woontack Woo