Sciweavers

582 search results - page 19 / 117
» Designing systems that direct human action
Sort
View
CCS
2008
ACM
14 years 11 months ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...
CMS
2006
175views Communications» more  CMS 2006»
14 years 10 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
CHI
2004
ACM
15 years 9 months ago
Human-robot speech interface understanding inexplicit utterances using vision
Speech interfaces should have a capability of dealing with inexplicit utterances including such as ellipsis and deixis since they are common phenomena in our daily conversation. T...
Zaliyana Mohd Hanafiah, Chizu Yamazaki, Akio Nakam...
PERVASIVE
2007
Springer
14 years 9 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...
IUI
2004
ACM
15 years 2 months ago
Object-action association: a HCI design model
While developing the Simple Gesturing User Interface (SGUI) API for incorporating simple gestures into personal digital assistant (PDA) user interfaces, we developed an object-bas...
Robert Pastel, Nathan Skalsky