Sciweavers

2648 search results - page 171 / 530
» Human Factors In Computer Security
Sort
View
ASIACRYPT
1999
Springer
15 years 9 months ago
ECC: Do We Need to Count?
Abstract. A prohibitive barrier faced by elliptic curve users is the difficulty of computing the curves’ cardinalities. Despite recent theoretical breakthroughs, point counting ...
Jean-Sébastien Coron, Helena Handschuh, Dav...
CHI
2006
ACM
16 years 5 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas
ACMACE
2007
ACM
15 years 8 months ago
Serious video game effectiveness
Given the interactive media characteristics and intrinsically motivating appeal, computer games are often praised for their potential and value in education. However, comprehensiv...
Wee Ling Wong, Cuihua Shen, Luciano Nocera, Eduard...
HRI
2009
ACM
15 years 11 months ago
The snackbot: documenting the design of a robot for long-term human-robot interaction
We present the design of the Snackbot, a robot that will deliver snacks in our university buildings. The robot is intended to provide a useful, continuing service and to serve as ...
Min Kyung Lee, Jodi Forlizzi, Paul E. Rybski, Fred...
HRI
2009
ACM
15 years 11 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...