Sciweavers

694 search results - page 16 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
CHI
2006
ACM
15 years 9 months ago
Usability of interaction patterns
Interaction patterns are becoming an important method for bridging the gap between analysis and design in user-centered design. Recent studies, however, have indicated problems in...
Katarina Segerståhl, Timo Jokela
WWW
2001
ACM
15 years 10 months ago
Improving mobile internet usability
Mobile internet technologies, such as WAP, are important for pervasive, anytime, anywhere computing. Although much progress has been made in terms of technological innovation, man...
George Buchanan, Sarah Farrant, Matt Jones, Harold...
CHI
2007
ACM
15 years 9 months ago
Meta-analysis of correlations among usability measures
Understanding the relation between usability measures seems crucial to deepen our conception of usability and to select the right measures for usability studies. We present a meta...
Kasper Hornbæk, Effie Lai-Chong Law
ERSHOV
1999
Springer
15 years 1 months ago
Binding-Time Analysis in Partial Evaluation: One Size Does Not Fit All
Abstract. Existing partial evaluators usually fix the strategy for binding-time analysis. But a single strategy cannot fulfill all goals without leading to compromises regarding ...
Niels H. Christensen, Robert Glück, Sø...