Sciweavers

1949 search results - page 93 / 390
» Protective Interface Specifications
Sort
View
CHI
2011
ACM
13 years 17 days ago
OldGen: mobile phone personalization for older adults
Mobile devices are currently difficult to customize for the usability needs of elderly users. The elderly are instead referred to specially designed “senior phones” or softwar...
Alex Olwal, Dimitris Lachanas, Ermioni Zacharouli
SACMAT
2009
ACM
14 years 3 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
CHI
2011
ACM
13 years 17 days ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
INFOVIS
2000
IEEE
14 years 1 months ago
Polaris: A System for Query, Analysis and Visualization of Multi-Dimensional Relational Databases
In the last several years, large multi-dimensional databases have become common in a variety of applications such as data warehousing and scientific computing. Analysis and explor...
Chris Stolte, Pat Hanrahan
TC
2008
13 years 9 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...