Sciweavers

169 search results - page 7 / 34
» Malicious interface design: exploiting the user
Sort
View
SIGCOMM
2006
ACM
14 years 1 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
IE
2007
13 years 9 months ago
An evaluation framework for videogame based tasking of remote vehicles
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
Adam J. Hassell, Philip Smith, David Stratton
CHI
2004
ACM
14 years 8 months ago
Wideband displays: mitigating multiple monitor seams
Wideband displays fill our field of view, creating new opportunities to develop effective visual interfaces. Although multiple monitors are becoming an affordable way to create wi...
Jock D. Mackinlay, Jeffrey Heer
DEEC
2006
IEEE
13 years 9 months ago
Explanation Services and Request Refinement in User Friendly Semantic-Enabled B2C E-Marketplaces
Abstract. This paper presents an approach aimed at fully exploiting semantics of supply/demand descriptions in B2C and C2C e-marketplaces. Distinguishing aspects include logic-base...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
IUI
2006
ACM
14 years 1 months ago
Head gesture recognition in intelligent interfaces: the role of context in improving recognition
Acknowledging an interruption with a nod of the head is a natural and intuitive communication gesture which can be performed without significantly disturbing a primary interface ...
Louis-Philippe Morency, Trevor Darrell