Sciweavers

4445 search results - page 91 / 889
» Reflective Authorization Systems
Sort
View
NORDICHI
2004
ACM
15 years 9 months ago
Two psychology-based usability inspection techniques studied in a diary experiment
Inspection techniques are widely used during systems design as a supplement to empirical evaluations of usability. Psychology-based inspection techniques could give important insi...
Kasper Hornbæk, Erik Frøkjær
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
ACMSE
2005
ACM
15 years 6 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
114
Voted
CHI
2005
ACM
15 years 6 months ago
Designs for home life
In this Special Interest Group (SIG) we intend to consider the increasingly popular area of interactive systems design for the home. Aiming to incorporate a wide range of perspect...
A. J. Bernheim Brush, Leysia Palen, Laurel Swan, A...
HUC
2010
Springer
15 years 4 months ago
Social sensing for epidemiological behavior change
An important question in behavioral epidemiology and public health is to understand how individual behavior is affected by illness and stress. Although changes in individual behav...
Anmol Madan, Manuel Cebrián, David Lazer, A...