Sciweavers

169 search results - page 1 / 34
» Malicious interface design: exploiting the user
Sort
View
WWW
2010
ACM
13 years 11 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
EICS
2010
ACM
13 years 6 months ago
Exploiting web service annotations in model-based user interface development
In this paper we present a method and the associated tool support able to exploit the content of Web service annotations in model-based user interface design and development. We a...
Fabio Paternò, Carmen Santoro, Lucio Davide...
VDB
1998
148views Database» more  VDB 1998»
13 years 5 months ago
Exploiting Model-based Techniques for User Interfaces to Databases
Model-based systems provide methods for supporting the systematic and efficient development of application interfaces. This paper examines how model-based technologies can be expl...
Tony Griffiths, Jo McKirdy, G. Forrester, Norman W...
WCNC
2008
IEEE
13 years 10 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
DNIS
2010
Springer
194views Database» more  DNIS 2010»
13 years 10 months ago
Interface Tailoring by Exploiting Temporality of Attributes for Small Screens
In the pervasive computing era, mobile phones and personal digital assistants are widely used for data collection. The traditional user interfaces which are employed for data colle...
Mittapally Kumara Swamy, P. Krishna Reddy, R. Uday...