Sciweavers

1315 search results - page 82 / 263
» Usability of dial-a-ride systems
Sort
View
CHI
2010
ACM
14 years 4 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
ITNG
2008
IEEE
14 years 4 months ago
A Minimalist Visual Notation for Design Patterns and Antipatterns
Achieving a quality software system requires UML designers a good understanding of both design patterns and antipatterns. Unfortunately, UML models for real systems tend to be huge...
Demis Ballis, Andrea Baruzzo, Marco Comini
SIGDOC
2006
ACM
14 years 4 months ago
Why don't people read the manual?
Few users of computer applications seek help from the documentation. This paper reports the results of an empirical study of why this is so and examines how, in real work, users s...
David G. Novick, Karen Ward
ACSAC
2005
IEEE
14 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
ACSAC
2003
IEEE
14 years 3 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...