Sciweavers

1597 search results - page 21 / 320
» Mental Models of Computer Security
Sort
View
CHI
2009
ACM
16 years 2 months ago
User-defined gestures for surface computing
Many surface computing prototypes have employed gestures created by system designers. Although such gestures are appropriate for early investigations, they are not necessarily ref...
Jacob O. Wobbrock, Meredith Ringel Morris, Andrew ...
111
Voted
AMI
2009
Springer
15 years 8 months ago
I Bet You Look Good on the Wall: Making the Invisible Computer Visible
The design ideal of the invisible computer, prevalent in the vision of ambient intelligence (AmI), has led to a number of interaction challenges. The complex nature of AmI environm...
Jo Vermeulen, Jonathan Slenders, Kris Luyten, Kari...
CHI
2005
ACM
16 years 2 months ago
Blind learners programming through audio
The development of programming skills is a motivating issue in computer science. Programming languages have been increasingly used to map end-users needs and mental models. The nu...
Jaime Sánchez, Fernando Aguayo
165
Voted
IEEESP
2011
14 years 5 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
114
Voted
HRI
2006
ACM
15 years 7 months ago
Acquiring a shared environment representation
Interacting with a domestic service robot implies the existence of a joint environment model for user and robot. To enable robot navigation within such a setting requires further ...
Elin Anna Topp, Henrik I. Christensen, Kerstin Sev...