Sciweavers

1513 search results - page 200 / 303
» A Better Mythology for System Design
Sort
View
SOUPS
2010
ACM
15 years 5 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
DAGSTUHL
2001
15 years 2 months ago
Visualization for the Mind's Eye
Software visualization has been almost exclusively tackled from the visual point of view; this means visualization occurs exclusively through the visual channel. This approach has ...
Nelson A. Baloian, Wolfram Luther
CHI
2005
ACM
16 years 1 months ago
ECHOES: encouraging companionship, home organization, and entertainment in seniors
The ECHOES project (Encouraging Companionship, Home Organization, and Entertainment in Seniors), is focused on understanding and improving aspects of companionship in senior popul...
Justin Donaldson, Joshua Evnin, Sidharth Saxena
SENSYS
2009
ACM
15 years 8 months ago
Achieving range-free localization beyond connectivity
Wireless sensor networks have been proposed for many location-dependent applications. In such applications, the requirement of low system cost prohibits many range-based methods f...
Ziguo Zhong, Tian He
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 5 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith