Sciweavers

557 search results - page 24 / 112
» Two experiences designing for effective security
Sort
View
CHI
2003
ACM
14 years 9 months ago
Designing social presence of social actors in human computer interaction
This study examines the interaction effect between user factors and media factors on feelings of social presence which are critical in the design of virtual reality systems and hu...
Kwan Min Lee, Clifford Nass
ISMAR
2003
IEEE
14 years 1 months ago
Using Augmented Reality for Visualizing Complex Graphs in Three Dimensions
In this paper we explore the effect of using Augmented Reality for three-dimensional graph link analysis. Two experiments were conducted. The first was designed to compare a tangi...
Daniel Belcher, Mark Billinghurst, Sean Hayes, Ran...
ASPDAC
2007
ACM
131views Hardware» more  ASPDAC 2007»
14 years 19 days ago
Fast Flip-Chip Pin-Out Designation Respin by Pin-Block Design and Floorplanning for Package-Board Codesign
Deep submicron effects drive the complication in designing chips, as well as in package designs and communications between package and board. As a result, the iterative interface d...
Ren-Jie Lee, Ming-Fang Lai, Hung-Ming Chen
ACTAC
2002
99views more  ACTAC 2002»
13 years 8 months ago
Recognizing Design Patterns in C++ Programs with the Integration of Columbus and Maisa
A method for recognizing design patterns from C++ programs is presented. The method consists of two separate phases, analysis and reverse engineering of the C++ code, and architec...
Rudolf Ferenc, Juha Gustafsson, Lászl&oacut...
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...