Sciweavers

2399 search results - page 44 / 480
» On Authentication between Human and Computer
Sort
View
NORDICHI
2004
ACM
15 years 3 months ago
Software usability: a comparison between two tree-structured data transformation languages
This paper presents the results of a software usability study, involving both subjective and objective evaluation. It compares a popular XML data transformation language (XSLT) an...
Nikita Schmidt, Corina Sas
LAWEB
2003
IEEE
15 years 3 months ago
Cooperation Schemes between a Web Server and a Web Search Engine
Search engines provide search results based on a large repository of pages downloaded by a web crawler from several servers. To provide best results, this repository must be kept ...
Carlos Castillo
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
EICS
2009
ACM
15 years 4 months ago
The tradeoff between spatial jitter and latency in pointing tasks
Interactive computing systems frequently use pointing as an input modality, while also supporting other forms of input such as alphanumeric, voice, gesture, and force. We focus on...
Andriy Pavlovych, Wolfgang Stürzlinger
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya