Sciweavers

694 search results - page 86 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
RSKT
2007
Springer
15 years 6 months ago
Mining Associations for Interface Design
Abstract. Consumer research has indicated that consumers use compensatory and non-compensatory decision strategies when formulating their purchasing decisions. Compensatory decisio...
Timothy Maciag, Daryl H. Hepting, Dominik Slezak, ...
AVI
2010
15 years 1 months ago
3D attentional maps: aggregated gaze visualizations in three-dimensional virtual environments
Gaze visualizations hold the potential to facilitate usability studies of interactive systems. However, visual gaze analysis in threedimensional virtual environments still lacks m...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
AIED
2007
Springer
15 years 6 months ago
How did the e-learning session go? The Student Inspector
Good teachers know their students, and exploit this knowledge to adapt or optimise their instruction. Traditional teachers know their students because they interact with them face-...
Oliver Scheuer, Claus Zinn
MMAS
2004
Springer
15 years 5 months ago
Multiagent-Based Demand Bus Simulation for Shanghai
Demand Bus System, a new public transportation system, is expected to be a convenient service for special transportation demands to solve more and more serious traffic problems con...
Zhiqiang Liu, Toru Ishida, Huanye Sheng
IACR
2011
182views more  IACR 2011»
13 years 11 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi