Sciweavers

2648 search results - page 136 / 530
» Human Factors In Computer Security
Sort
View
123
Voted
ASIACRYPT
2003
Springer
15 years 10 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
CHI
2006
ACM
16 years 5 months ago
Whither or whether HCI: requirements analysis for multi-sited, multi-user cyberinfrastructures
Cyberinfrastructures bring together distributed resources to support scientific discoveries. Cyberinfrastructures currently under development are intended to enable the cooperativ...
Ann Zimmerman, Bonnie A. Nardi
MHCI
2009
Springer
15 years 11 months ago
A preliminary evaluation of head and facial feature tracking for input on mobile devices
This paper discusses the concept of using head and facial feature tracking as an input mechanism for mobile devices. We present our concept and ideas, along with preliminary findi...
Kathryn Carnegie, Stuart Fleming, Esfandiar Ammira...
CHI
2010
ACM
15 years 11 months ago
Tagliatelle: social tagging to encourage healthier eating
This paper describes the design and initial evaluation of Tag-liatelle, a collaborative tagging application for encouraging healthier eating. Users photograph their own meals and ...
Conor Linehan, Mark Doughty, Shaun Lawson, Ben Kir...
SC
2005
ACM
15 years 10 months ago
Parallel Programmer Productivity: A Case Study of Novice Parallel Programmers
In developing High-Performance Computing (HPC) software, time to solution is an important metric. This metric is comprised of two main components: the human effort required develo...
Lorin Hochstein, Jeffrey Carver, Forrest Shull, Si...