Sciweavers

12478 search results - page 191 / 2496
» Secure Interaction Design
Sort
View
115
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
CCS
2003
ACM
15 years 7 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
ITIIS
2008
91views more  ITIIS 2008»
15 years 3 months ago
Towards a Server-Centric Interaction Architecture for Wireless Applications
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...
CHI
1993
ACM
15 years 8 months ago
Preserving knowledge in design projects: what designers need to know
In order to inform the design of technology support and new procedural methodsfor softwaredesign,we analyzed the content of real design meetingsin threeorganizations, focusing in ...
James D. Herbsleb, Eiji Kuwana
AGENTS
2000
Springer
15 years 8 months ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom