Sciweavers

12478 search results - page 353 / 2496
» Secure Interaction Design
Sort
View
122
Voted
FPL
2008
Springer
112views Hardware» more  FPL 2008»
15 years 6 months ago
Secure FPGA configuration architecture preventing system downgrade
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Benoît Badrignans, Reouven Elbaz, Lionel Tor...
174
Voted
ICAI
2003
15 years 6 months ago
A Secure Agent Architecture for Sensor Networks
Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sen...
Zhaoyu Liu, Yongge Wang
CHI
2005
ACM
16 years 5 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
ICCV
2007
IEEE
15 years 11 months ago
Vision-Based Projected Tabletop Interface for Finger Interactions
Abstract. We designed and implemented a vision-based projected tabletop interface for finger interaction. The system offers a simple and quick setup and economic design. The proj...
Peng Song, Stefan Winkler, Syed Omer Gilani, ZhiYi...
CONSTRAINTS
2002
96views more  CONSTRAINTS 2002»
15 years 4 months ago
QOCA: A Constraint Solving Toolkit for Interactive Graphical Applications
We describe an object-oriented constraint solving toolkit, QOCA, designed for interactive graphical applications. It has a simple yet powerful interface based on the metric space m...
Kim Marriott, Sitt Sen Chok