Sciweavers

12478 search results - page 8 / 2496
» Secure Interaction Design
Sort
View
100
Voted
OOPSLA
2010
Springer
15 years 7 days ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
CHI
2010
ACM
15 years 8 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
82
Voted
AGENTS
1998
Springer
15 years 6 months ago
Agent Design Patterns: Elements of Agent Application Design
Yariv Aridor, Danny B. Lange
106
Voted
IEEEIAS
2008
IEEE
15 years 8 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
128
Voted
BCSHCI
2009
14 years 11 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode