Sciweavers

2927 search results - page 20 / 586
» Secure Distributed Human Computation
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
MIDDLEWARE
2004
Springer
14 years 1 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
CHI
2011
ACM
12 years 11 months ago
Evaluating eXtreme scenario-based design in a distributed agile team
Jason Chong Lee, Tejinder K. Judge, D. Scott McCri...
SOUPS
2005
ACM
14 years 1 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko