Sciweavers

2493 search results - page 373 / 499
» Accessibility in virtual worlds
Sort
View
IHI
2010
106views Healthcare» more  IHI 2010»
14 years 8 months ago
Identifying opportunities for inpatient-centric technology
The evolution from a disease-centered model of care to a more patient-centered model presents opportunities for going beyond designing technology to support medical professionals ...
Meredith M. Skeels, Desney S. Tan
JOC
2010
92views more  JOC 2010»
14 years 8 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
CCS
2009
ACM
16 years 2 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
MOBISYS
2008
ACM
16 years 1 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
ELPUB
1999
ACM
15 years 6 months ago
Learning Curves: Managing Smooth Product Development Cycles in Non-Print Environments
and abstract entry. But since the burgeoning of the scholarly literature since World War II, these processes had become well-known and expertly done by most organizations in the pu...
Jill O'Neill, Chris Leonard