Sciweavers

3007 search results - page 31 / 602
» Designing for collective remembering
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
76
Voted
GPCE
2004
Springer
15 years 2 months ago
Generating AspectJ Programs with Meta-AspectJ
Abstract. Meta-AspectJ (MAJ) is a language tool for generating AspectJ programs using code templates. MAJ itself is an extension of Java, so users can interleave arbitrary Java cod...
David Zook, Shan Shan Huang, Yannis Smaragdakis
101
Voted
CCS
2008
ACM
14 years 11 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
BEHAVIOURIT
2004
171views more  BEHAVIOURIT 2004»
14 years 9 months ago
Long-term working memory and interrupting messages in human - computer interaction
The extent to which memory for information content is reliable, trustworthy, and accurate is crucial in the information age. Being forced to divert attention to interrupting messag...
Antti Oulasvirta, Pertti Saariluoma
85
Voted
CHI
2009
ACM
14 years 7 months ago
Semantically structured tag clouds: an empirical evaluation of clustered presentation approaches
Tag clouds have become a frequently used interaction technique in the web. Recently several approaches to present tag clouds with the tags semantically clustered have been propose...
Johann Schrammel, Michael Leitner, Manfred Tscheli...