Sciweavers

1384 search results - page 123 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 4 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
LAWEB
2009
IEEE
15 years 4 months ago
A Model-Based Approach for Developing Vectorial User Interfaces
—This paper presents a model-based approach for developing vectorial user interfaces to an interactive applications, whether it is a web or a stand-alone applications. A vectoria...
Jean Vanderdonckt, Josefina Guerrero García...
INTERACT
2007
14 years 11 months ago
Towards a Physiological Model of User Interruptability
User interruptability has become an important topic of study in Human-Computer Interaction (HCI). However, automatically determining the availability of users is still problematic....
Daniel Chen, Jamie Hart, Roel Vertegaal
ESORICS
2005
Springer
15 years 3 months ago
Browser Model for Security Analysis of Browser-Based Protocols
Currently, many industrial initiatives focus on web-based applications. In this context an important requirement is that the user should only rely on a standard web browser. Hence...
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sa...
ECCC
2010
98views more  ECCC 2010»
14 years 8 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi