Sciweavers

694 search results - page 43 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CHI
2003
ACM
16 years 5 days ago
Navigating in a mobile XHTML application
The Internet has been a great success in the fixed world, whereas WAP (Wireless Application Protocol), the mobile Internet, has not fulfilled its promise. However, now the analyst...
Anne Kaikkonen, Virpi Roto
CHI
2003
ACM
16 years 5 days ago
A fisheye calendar interface for PDAs: providing overviews for small displays
Calendar applications for small handheld devices such as PDAs are growing in popularity. This led us to develop FishCal, a novel calendar interface for PDAs. It supports users in ...
Benjamin B. Bederson, Aaron Clamage, Mary Czerwins...
WSC
2008
15 years 2 months ago
Towards a flexible business process modeling and simulation environment
Business process is crucial to the success of any business. Business process modeling enables a common understanding and analysis of a business process, and simulation is an effec...
Changrui Ren, Wei Wang, Jin Dong, Hongwei Ding, Bi...
SOUPS
2009
ACM
15 years 6 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
SAC
2008
ACM
14 years 11 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann