Sciweavers

1949 search results - page 201 / 390
» Protective Interface Specifications
Sort
View
CHI
2011
ACM
14 years 6 months ago
Collaborative creativity: a complex systems model with distributed affect
The study of creativity has received significant attention over the past century, with a recent increase in interest in collaborative, distributed creativity. We posit that creati...
Cecilia R. Aragon, Alison Williams
MHCI
2009
Springer
15 years 9 months ago
User evaluation of lightweight user authentication with a single tri-axis accelerometer
We report a series of user studies that evaluate the feasibility and usability of light-weight user authentication with a single tri-axis accelerometer. We base our investigation ...
Jiayang Liu, Lin Zhong, Jehan Wickramasuriya, Venu...
PLDI
2006
ACM
15 years 9 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
VIZSEC
2005
Springer
15 years 8 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
SOUPS
2010
ACM
15 years 7 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash