Sciweavers

15379 search results - page 169 / 3076
» Protecting users from
Sort
View
WWW
2005
ACM
14 years 8 months ago
WebPod: persistent Web browsing sessions with pocketable storage devices
We present WebPod, a portable system that enables mobile users to use the same persistent, personalized web browsing session on any Internet-enabled device. No matter what compute...
Shaya Potter, Jason Nieh
IEEEARES
2008
IEEE
14 years 2 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 3 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
UMUAI
2002
76views more  UMUAI 2002»
13 years 7 months ago
User Models and User Physical Capability
Current interface design practices are based on user models and descriptions derived almost exclusively from studies of able-bodied users (Keates et al., 1999). However, such users...
Simeon Keates, Patrick Langdon, P. John Clarkson, ...
IWEC
2010
13 years 5 months ago
Investigating the Affective Quality of Motion in User Interfaces to Improve User Experience
This study focuses on motion in user interfaces as a design element which can contribute to an improved user experience of digital media entertainment. The design for user experien...
Doyun Park, Ji-Hyun Lee