Sciweavers

694 search results - page 78 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
IADIS
2008
15 years 1 months ago
Autonomous Presentation Capture In Corporate And Educational Settings
While researchers have been exploring automatic presentation capture since the 1990's, real world adoption has been limited. Our research focuses on simplifying presentation ...
David M. Hilbert, Thea Turner, Laurent Denoue, Kan...
CHI
2005
ACM
16 years 7 days ago
Tool for accurately predicting website navigation problems, non-problems, problem severity, and effectiveness of repairs
The Cognitive Walkthrough for the Web (CWW) is a partially automated usability evaluation method for identifying and repairing website navigation problems. Building on five earlie...
Marilyn Hughes Blackmon, Muneo Kitajima, Peter G. ...
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
15 years 1 months ago
Model Driven Design and Implementation of Statistical Surveys
We describe the evolution of a statistical survey design visual language from a standalone design-time modelling language into an environment supporting design, coordination, exec...
Chul Hwee Kim, John G. Hosking, John C. Grundy
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 5 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
NCM
2010
14 years 10 months ago
Blink: Large-scale P2P network monitoring and visualization system using VM introspection
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network is now ser...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda