Sciweavers

12478 search results - page 248 / 2496
» Secure Interaction Design
Sort
View
CHI
2009
ACM
16 years 5 months ago
Squidy: a zoomable design environment for natural user interfaces
We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a ...
Harald Reiterer, Roman Rädle, Werner A. K&oum...
CHI
2010
ACM
15 years 11 months ago
Understanding the space for co-design in riders' interactions with a transit service
The recent advances in web 2.0 technologies and the rapid adoption of smart phones raises many opportunities for public services to improve their services by engaging their users ...
Daisy Yoo, John Zimmerman, Aaron Steinfeld, Anthon...
SACMAT
2009
ACM
15 years 11 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
ASPDAC
2005
ACM
104views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Low-power techniques for network security processors
Abstract— In this paper, we present several techniques for lowpower design, including a descriptor-based low-power scheduling algorithm, design of dynamic voltage generator, and ...
Yi-Ping You, Chun-Yen Tseng, Yu-Hui Huang, Po-Chiu...
ACSAC
1999
IEEE
15 years 8 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer