Sciweavers

2236 search results - page 242 / 448
» Secure Software Design in Practice
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
14 years 10 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
CHI
2005
ACM
16 years 3 months ago
Testing the media equation with children
Designers of children's technology are often more interested in user motivation than those who design systems for adults. Since children's technology often has aims such...
Sonia Chiasson, Carl Gutwin
WOA
2010
15 years 1 months ago
Developing Web Client Applications with JaCa-Web
Abstract--We believe that agent-oriented programming languages and multi-agent programming technologies provide an effective level of abstraction for tackling the design and progra...
Mattia Minotti, Andrea Santi, Alessandro Ricci
CSCW
2008
ACM
15 years 3 months ago
Unpacking Tasks: The Fusion of New Technology with Instructional Work
This paper discusses how a new technology (designed to help pupils with learning about Shakespeare's Macbeth) is introduced and integrated into existing classroom practices. I...
Christian Greiffenhagen
CHI
2008
ACM
16 years 3 months ago
Revisiting usability's three key principles
The foundations of much HCI research and practice were established over 20 years ago and elaborated as three key principles by Gould and Lewis [7]: early focus on users and tasks ...
Gilbert Cockton