Sciweavers

12 search results - page 1 / 3
» Investigating an appropriate design for personal firewalls
Sort
View
CHI
2010
ACM
13 years 11 months ago
Investigating an appropriate design for personal firewalls
Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to ...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov,...
SOUPS
2009
ACM
13 years 11 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
ISSTA
2012
ACM
11 years 7 months ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
DNIS
2010
Springer
194views Database» more  DNIS 2010»
13 years 11 months ago
Interface Tailoring by Exploiting Temporality of Attributes for Small Screens
In the pervasive computing era, mobile phones and personal digital assistants are widely used for data collection. The traditional user interfaces which are employed for data colle...
Mittapally Kumara Swamy, P. Krishna Reddy, R. Uday...
HRI
2006
ACM
13 years 10 months ago
How contingent should a communication robot be?
The purpose of our research is to develop lifelike behavior in a communication robot, which is expected to potentially make human-robot interaction more natural. Our previous rese...
Fumitaka Yamaoka, Takayuki Kanda, Hiroshi Ishiguro...