Sciweavers

1412 search results - page 82 / 283
» Experience Prototyping
Sort
View
PERCOM
2007
ACM
16 years 2 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
TEI
2010
ACM
127views Hardware» more  TEI 2010»
15 years 10 months ago
Ambient sites: making tangible the subtle, ephemeral and seemingly silent
Ambient Sites are proximal. At our fingertips, under the soles of our feet, along the edge of a cheek, they are characterized by the permeability of boundaries, the sudden awarene...
Diane Willow
DSN
2006
IEEE
15 years 9 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
IC
2003
15 years 4 months ago
An Architecture for Efficient, Flexible Enterprise System Integration
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...
AUIC
2006
IEEE
15 years 9 months ago
Generating mobile device user interfaces for diagram-based modelling tools
Mobile display devices such as phones and PDAs have become very widely available and used. However, most content on these devices is limited to text, static images and motion vide...
Dejin Zhao, John C. Grundy, John G. Hosking