Sciweavers

694 search results - page 15 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 9 months ago
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
this paper demonstrates analysis of well known block cipher CAST-128 and its modified version using avalanche criterion and other tests namely encryption quality, correlation coeff...
G. N. Krishnamurthy, V. Ramaswamy
CHI
2009
ACM
15 years 10 months ago
Towards systematic usability verification
Although usability is the core aspect of the whole HCI research field, it still waits for its economic breakthrough. There are some corporations that are famous for their usable p...
Jan Borchers, Jonathan Diehl, Markus Jordans, Max ...
IUI
2004
ACM
15 years 2 months ago
Usability trade-offs for adaptive user interfaces: ease of use and learnability
An analysis of context-aware user interfaces shows that adaptation mechanisms have a cost-benefit trade-off for usability. Unpredictable autonomous interface adaptations can easil...
Tim F. Paymans, Jasper Lindenberg, Mark A. Neerinc...
CSUR
2000
101views more  CSUR 2000»
14 years 9 months ago
Extracting usability information from user interface events
to extract information at a level of abstraction that is useful to investigators interested in analyzing application usage or evaluating usability. This survey examines computer-ai...
David M. Hilbert, David F. Redmiles
76
Voted
SIGDOC
2005
ACM
15 years 3 months ago
Sensorium games: usability considerations for pervasive gaming
The Sensorium family of games provides a platform and environment for multiplayer games in a pervasive environment. Each player is equipped with a mote, which (along with those of...
S. N. I. Mount, Elena I. Gaura, Robert M. Newman