Sciweavers

2648 search results - page 188 / 530
» Human Factors In Computer Security
Sort
View
SIGCSE
2008
ACM
120views Education» more  SIGCSE 2008»
15 years 4 months ago
A system for developing tablet pc applications for education
We describe a new system for building Tablet PC-based classroom software. The system, called SLICE, is built for extensibility, using a unique "explicit state" model. Ap...
Sam Kamin, Michael Hines, Chad Peiper, Boris Capit...
TCS
2008
15 years 4 months ago
Detection of subtle variations as consensus motifs
We address the problem of detecting consensus motifs, that occur with subtle variations, across multiple sequences. These are usually functional domains in DNA sequences such as t...
Matteo Comin, Laxmi Parida
APCHI
2004
IEEE
15 years 8 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
136
Voted
CHI
2008
ACM
16 years 5 months ago
The Georgia Tech aware home
The Aware Home Research Initiative (AHRI) at Georgia Tech is devoted to the multidisciplinary exploration of emerging technologies and services based in the home. Starting in 1998...
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed...
137
Voted
HUC
2007
Springer
15 years 8 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...