Sciweavers

2648 search results - page 92 / 530
» Human Factors In Computer Security
Sort
View
CHI
2009
ACM
15 years 10 months ago
Crowd computer interaction
HCI has moved from considering how individuals interact with computers to thinking about how groups collaborate using technology. While there has been research focused on large-sc...
Barry A. T. Brown, Kenton O'Hara, Tim Kindberg, Am...
ACMSE
2006
ACM
15 years 3 months ago
Computer tutoring for programming education
Software is increasingly pervasive in the products we use. Consequently, more programmers are needed to develop the software, and consequently there is unmet demand on programming...
Susan Eitelman
SAC
2004
ACM
15 years 3 months ago
A Ubiquitous Computing environment for aircraft maintenance
Ubiquitous Computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for havi...
Matthias Lampe, Martin Strassner, Elgar Fleisch
ICICS
2001
Springer
15 years 2 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
ACMDIS
2004
ACM
15 years 3 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...