Sciweavers

12478 search results - page 329 / 2496
» Secure Interaction Design
Sort
View
190
Voted
CANDC
2009
ACM
15 years 2 months ago
Designing to support reasoned imagination through embodied metaphor
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental ...
Alissa Nicole Antle, Greg Corness, Saskia Bakker, ...
IWCMC
2010
ACM
15 years 7 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
BMCBI
2010
127views more  BMCBI 2010»
15 years 5 months ago
PeptideMine - A webserver for the design of peptides for protein-peptide binding studies derived from protein-protein interactom
Background: Signal transduction events often involve transient, yet specific, interactions between structurally conserved protein domains and polypeptide sequences in target prote...
Khader Shameer, Lalima L. Madan, Shivamurthy Veera...
142
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
BWCCA
2010
14 years 12 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang