Sciweavers

169 search results - page 2 / 34
» Malicious interface design: exploiting the user
Sort
View
ICAS
2008
IEEE
151views Robotics» more  ICAS 2008»
13 years 11 months ago
A Transformational Approach for Pattern-Based Design of User Interfaces
A pattern-based approach to user interface development is presented that is explicitly based on artifacts contained in a task and a domain models. Exploiting a task model or a dom...
Costin Pribeanu, Jean Vanderdonckt
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
13 years 10 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
WWW
2010
ACM
13 years 11 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ISUVR
2007
13 years 6 months ago
Graphical Tangible User Interface for a AR Authoring Tool in Product Design Environment
—We are suggesting a graphical tangible user interface for augmented reality (AR) authoring tool in product design Environment. This user interface can be used for more efficient...
Taejin Ha, Woontack Woo
SERP
2004
13 years 6 months ago
The Architectural Design of FRUIT: A Family of Retargetable User Interface Tools
Forms-based user interfaces are widely used means for human-computer interaction. However, it is difficult to exploit software reuse in forms-based systems because the systems ten...
Yi Liu, H. Conrad Cunningham, Hui Xiong