Sciweavers

8655 search results - page 388 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2008
ACM
16 years 4 months ago
The effects of semantic grouping on visual search
This paper reports on work-in-progress to better understand how users visually interact with hierarchically organized semantic information. Experimental reaction time and eye move...
Tim Halverson, Anthony J. Hornof
117
Voted
CHI
2007
ACM
16 years 4 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
119
Voted
CHI
2003
ACM
16 years 4 months ago
Exertion interfaces: sports over a distance for social bonding and fun
An Exertion Interface is an interface that deliberately requires intense physical effort. Exertion Interfaces have applications in "Sports over a Distance", potentially ...
Florian Mueller, Stefan Agamanolis, Rosalind W. Pi...
SAC
2010
ACM
15 years 10 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 10 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto