Sciweavers

340 search results - page 14 / 68
» With Gaming Technology towards Secure User Interfaces
Sort
View
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
IADIS
2004
13 years 9 months ago
A Study on Mobile Game Adoption Under HPI(High-Speed Portable Internet) Environment
Mobile game is considered as one of the emerging mobile services in recent years. A number of mobile game companies have been established and on-line game providers have also atte...
Young Seog Yoon, Im Sook Há, Mun Kee Choi
CHI
2008
ACM
14 years 8 months ago
The cuetable: cooperative and competitive multi-touch interaction on a tabletop
In this paper we explain how we built cueTable, a multi-touch interactive tabletop, as a base technology to explore new interaction concepts for cooperative and competitive multi-...
Tom Gross, Mirko Fetter, Sascha Liebsch
WISE
2008
Springer
14 years 2 months ago
Towards an Ontology-Based Approach for Dealing with Web Guidelines
This paper presents an Ontology-based approach for dealing with guidelines concerning the usability and the accessibility of Web applications. We report an ontology which provides ...
Joseph Xiong, Christelle Farenc, Marco Winckler
WIKIS
2010
ACM
13 years 5 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...