Sciweavers

12478 search results - page 58 / 2496
» Secure Interaction Design
Sort
View
124
Voted
AGENTS
2000
Springer
15 years 6 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 6 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig
CAINE
2003
15 years 3 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
120
Voted
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
15 years 6 months ago
Groupware for Design: An Interactive System to Facilitate Creative Processes in Team Design Work
Creativity as modeled using the recluse genius paradigm fails to recognize the necessity and value of the collaborative aspects involved. Enhancing the creative output of teams wi...
Arjun Venkataswamy, Rajinder Sodhi, Yerkin Abdildi...
131
Voted
VL
2008
IEEE
160views Visual Languages» more  VL 2008»
15 years 9 months ago
How designers design and program interactive behaviors
Designers are skilled at sketching and prototyping the look of interfaces, but to explore various behaviors (what the interface does in response to input) typically requires progr...
Brad A. Myers, Sun Young Park, Yoko Nakano, Greg M...