Sciweavers

12478 search results - page 111 / 2496
» Secure Interaction Design
Sort
View
INTERACT
1997
15 years 4 months ago
BUILD-IT: a computer vision-based interaction technique of a planning tool for construction and design
It is time to go beyond the established approaches in human-computer interaction. With the Augmented Reality (AR) design strategy humans are able to behave as much as possible in a...
Matthias Rauterberg, Martin Bichsel, Ulf Leonhardt...
124
Voted
IJCAT
2006
88views more  IJCAT 2006»
15 years 3 months ago
Interaction design patterns for computers in sociable use
: This article contributes to a growing body of design patterns in interaction design for cooperative work, while also describing how to go from field studies to design patterns. I...
Mattias Arvola
117
Voted
ACSAC
1998
IEEE
15 years 7 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
CHI
2008
ACM
16 years 3 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...