Sciweavers

1597 search results - page 13 / 320
» Mental Models of Computer Security
Sort
View
104
Voted
ESANN
2004
15 years 1 months ago
HMM and IOHMM modeling of EEG rhythms for asynchronous BCI systems
We compare the use of two Markovian models, HMMs and IOHMMs, to discriminate between three mental tasks for brain computer interface systems using an asynchronous protocol. We show...
Silvia Chiappa, Nicolas Donckers, Samy Bengio, Fr&...
101
Voted
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
100
Voted
SOUPS
2010
ACM
14 years 12 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
CHI
2007
ACM
16 years 1 days ago
How it works: a field study of non-technical users interacting with an intelligent system
In order to develop intelligent systems that attain the trust of their users, it is important to understand how users perceive such systems and develop those perceptions over time...
Joe Tullio, Anind K. Dey, Jason Chalecki, James Fo...
ISMAR
2002
IEEE
15 years 4 months ago
Augmented Urban Planning Workbench: Overlaying Drawings, Physical Models and Digital Simulation
There is a problem in the spatial and temporal separation between the varying forms of representation used in urban design. Sketches, physical models, and more recently computatio...
Hiroshi Ishii, Eran Ben-Joseph, John Underkoffler,...