Sciweavers

2648 search results - page 153 / 530
» Human Factors In Computer Security
Sort
View
136
Voted
CHI
2008
ACM
16 years 5 months ago
User interface history
User Interfaces have been around as long as computers have existed, even well before the field of HumanComputer Interaction was established. Over the years, some papers on the his...
Anker Helms Jørgensen, Brad A. Myers
CHI
2009
ACM
15 years 9 months ago
The problem of consistency in the design of Fitts' law experiments: consider either target distance and width or movement form a
An intriguing anomaly of the usual way of designing Fitts’ law experiments in experimental psychology and HCI is exposed: experiments are traditionally designed so as to careful...
Yves Guiard
ICAC
2009
IEEE
15 years 11 months ago
Experiences with scheduling and mapping games for adaptive distributed systems: summary
We apply the concept of “games with a purpose” to NPcomplete mapping and scheduling problems in distributed systems and report our experiences. The particular context is a sch...
Bin Lin, Peter A. Dinda
134
Voted
IEEEARES
2006
IEEE
15 years 11 months ago
E-voting: Dependability Requirements and Design for Dependability
Elections are increasingly dependent on computers and telecommunication systems. Such “E-voting” schemes create socio-technical systems (combinations of technology and human o...
Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, L...
126
Voted
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 9 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...