Sciweavers

4201 search results - page 14 / 841
» Our Users have Root!
Sort
View
WWW
2007
ACM
14 years 8 months ago
Formalization, User Strategy And Interaction Design: Users? Behaviour With Discourse Tagging Semantics
When authors publish their interpretations of the ideas, opinions, claims or rebuttals in the literature, they are drawing on a repertoire of well understood moves, contributing t...
Bertrand Sereno, Simon Buckingham Shum, Enrico Mot...
EUROPKI
2004
Springer
14 years 1 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
JOT
2008
228views more  JOT 2008»
13 years 8 months ago
Adapting the User Interface of Integrated Development Environments (IDEs) for Novice Users
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
SWWS
2010
13 years 5 months ago
Improving User Query Processing Based on User Profile and Task Context
- Today there is a real challenge in accessing relevant information according to the needs and the context of the user. Recent studies have dynamically enhanced the user query with...
Ounas Asfari, Bich-Liên Doan, Yolaine Bourda...
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 8 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu