Sciweavers

2250 search results - page 86 / 450
» Authorizing applications in singularity
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
14 years 10 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
CHI
2008
ACM
15 years 10 months ago
Photos on the go: a mobile application case study
We designed and iterated on a photo browsing application for high-end mobile phones. The application, Zurfer, supports viewing of photos from the user, their contacts, and the gen...
Mor Naaman, Rahul Nair, Vlad Kaplun
OTM
2005
Springer
15 years 3 months ago
Empirical Evaluation of Dynamic Local Adaptation for Distributed Mobile Applications
Distributed mobile applications operate on devices with diverse capabilities, in heterogeneous environments, where parameters such as processor, memory and network utilisation, are...
Pablo Rossi, Caspar Ryan
CHI
2007
ACM
15 years 10 months ago
Disruption and recovery of computing tasks: field study, analysis, and directions
We report on a field study of the multitasking behavior of computer users focused on the suspension and resumption of tasks. Data was collected with a tool that logged users'...
Shamsi T. Iqbal, Eric Horvitz
HICSS
2008
IEEE
117views Biometrics» more  HICSS 2008»
15 years 4 months ago
Online Gestures: Icon Use by Fan Communities on LiveJournal
This paper examines the use of icons as communication devices in persistent conversations. The paper presents findings from the author’s ethnographic study of a fan group on Liv...
Claudia Rebaza