Sciweavers

12478 search results - page 354 / 2496
» Secure Interaction Design
Sort
View
MHCI
2009
Springer
15 years 11 months ago
Improving the accessibility of NFC/RFID-based mobile interaction through learnability and guidance
NFC and RFID technologies have found their way into current mobile phones and research has presented a variety of applications using NFC/RFID tags for interaction between physical...
Gregor Broll, Susanne Keck, Paul Holleis, Andreas ...
181
Voted
EKAW
2008
Springer
15 years 6 months ago
A Visual Approach to Semantic Query Design Using a Web-Based Graphical Query Designer
Query formulation is a key aspect of information retrieval, contributing to both the efficiency and usability of many semantic applications. A number of query languages, such as SP...
Paul R. Smart, Alistair Russell, Dave Braines, Yan...
GECCO
2008
Springer
159views Optimization» more  GECCO 2008»
15 years 6 months ago
IGAP: interactive genetic algorithm peer to peer
We present IGAP, a peer to peer interactive genetic algorithm which reflects the real world methodology followed in team design. We apply our methodology to floorplanning. Throu...
Juan C. Quiroz, Amit Banerjee, Sushil J. Louis
DAC
2007
ACM
16 years 6 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
16 years 5 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...