Sciweavers

2648 search results - page 82 / 530
» Human Factors In Computer Security
Sort
View
MM
2006
ACM
151views Multimedia» more  MM 2006»
15 years 3 months ago
Choreographic buttons: promoting social interaction through human movement and clear affordances
We used human movement as the basis for designing a collaborative aesthetic design environment. Our intention was to promote social interaction and creative expression. We employe...
Andrew Webb, Andruid Kerne, Eunyee Koh, Pranesh Jo...
ISMAR
2008
IEEE
15 years 4 months ago
Vesp'R: design and evaluation of a handheld AR device
This paper focuses on the design of devices for handheld spatial interaction. In particular, it addresses the requirements and construction of a new platform for interactive AR, d...
Eduardo E. Veas, Ernst Kruijff
APGV
2010
ACM
266views Visualization» more  APGV 2010»
15 years 1 months ago
Horizon estimation: perceptual and computational experiments
The human visual system is able to quickly and robustly infer a wealth of scene information – the scene "gist" – already after 100 milliseconds of image presentation...
Christian Herdtweck, Christian Wallraven
ASIACRYPT
2009
Springer
15 years 4 months ago
Security Bounds for the Design of Code-Based Cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Matthieu Finiasz, Nicolas Sendrier
GI
2007
Springer
15 years 1 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch