Sciweavers

1190 search results - page 64 / 238
» You are There
Sort
View
GECCO
2003
Springer
14 years 1 months ago
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties...
John A. Clark, Jeremy L. Jacob, Susan Stepney
CHI
2010
ACM
14 years 1 months ago
O job can you return my mojo: improving human engagement and enjoyment in routine activities
Unlike machines, we humans are prone to boredom when we perform routine activities for long periods of time. Workers’ mental engagement in boring tasks diminishes, which eventua...
Dvijesh Shastri, Yuichi Fujiki, Ross Buffington, P...
ACSAC
2002
IEEE
14 years 1 months ago
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision
Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
PG
2002
IEEE
14 years 1 months ago
May I talk to you? : -)" - Facial Animation from Text
We introduce a facial animation system that produces real-time animation sequences including speech synchronization and non-verbal speech-related facial expressions from plain tex...
Irene Albrecht, Jörg Haber, Kolja Kähler...