Sciweavers

14720 search results - page 2744 / 2944
» Interface
Sort
View
162
Voted
XPU
2004
Springer
15 years 9 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols
IEEEARES
2010
IEEE
15 years 9 months ago
Visualizing Past Personal Data Disclosures
—Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers’ appetite for personal user data, however, is ...
Jan Kolter, Michael Netter, Günther Pernul
124
Voted
CHI
2010
ACM
15 years 9 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
CHI
2010
ACM
15 years 9 months ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
124
Voted
AIPR
2003
IEEE
15 years 9 months ago
Quick Response Airborne Deployment of Viper Muzzle Flash Detection and Location System During DC Sniper Attacks
The VIPER infrared muzzle flash detection system was deployed from a helicopter and an airship in response to the Washington, DC area sniper attacks in October 2002. The system co...
M. Pauli, M. C. Ertem, E. Heidhausen
« Prev « First page 2744 / 2944 Last » Next »