Sciweavers

5722 search results - page 170 / 1145
» Security Function Interactions
Sort
View
105
Voted
IUI
2009
ACM
15 years 9 months ago
Multi-touch interaction for robot control
Recent developments in multi-touch technologies have exposed fertile ground for research in enriched humanrobot interaction. Although multi-touch technologies have been used for v...
Mark Micire, Jill L. Drury, Brenden Keyes, Holly A...
95
Voted
OOPSLA
2005
Springer
15 years 6 months ago
An interactive visualization of refactorings retrieved from software archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Peter Weißgerber, Stephan Diehl, Carsten G&o...
107
Voted
RAID
2005
Springer
15 years 6 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
SOUPS
2006
ACM
15 years 6 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
88
Voted
SAC
2005
ACM
15 years 6 months ago
Scalable security and accounting services for content-based publish/subscribe systems
Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large scale dynamic applications. However, widespread use of these systems...
Himanshu Khurana