Sciweavers

12478 search results - page 288 / 2496
» Secure Interaction Design
Sort
View
CHI
2003
ACM
16 years 5 months ago
Designing visualizations of social activity: six claims
In this paper, we describe a set of claims that have evolved from our work in designing visual representations of groups in online environments. We argue that these claims can ser...
Thomas Erickson
ER
2006
Springer
102views Database» more  ER 2006»
15 years 8 months ago
Notes for the Conceptual Design of Interfaces
This paper presents a design method for user interfaces based on some ideas from conversation analysis. The method uses interaction diagram and it is conceived to design all flow ...
Simone Santini
DSRT
2008
IEEE
15 years 11 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
ASPLOS
2006
ACM
15 years 10 months ago
SecCMP: a secure chip-multiprocessor architecture
Security has been considered as an important issue in processor design. Most of the existing mechanisms address security and integrity issues caused by untrusted main memory in si...
Li Yang, Lu Peng
WS
2003
ACM
15 years 10 months ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...