Sciweavers

653 search results - page 77 / 131
» Specifying Business Requirements through Interaction Design
Sort
View
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
14 years 10 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
ACMSE
2005
ACM
15 years 4 months ago
Facilitating and automating empirical evaluation
Through the automation of empirical evaluation we hope to alleviate evaluation problems encountered by software designers who are relatively new to the process. Barriers to good e...
Laurian Hobby, John Booker, D. Scott McCrickard, C...
CHI
2009
ACM
15 years 11 months ago
Body and mind: a study of avatar personalization in three virtual worlds
An increasingly large number of users connect to virtual worlds on a regular basis to conduct activities ranging from gaming to business meetings. In all these worlds, users proje...
Nicolas Ducheneaut, Ming-Hui Wen, Nicholas Yee, Gr...
DRM
2006
Springer
15 years 2 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
ECCB
2002
IEEE
15 years 4 months ago
Stochastic roadmap simulation for the study of ligand-protein interactions
The dynamics of ligand-protein interactions are necessary to understand for the design of novel therapeutic agents. In this paper, we establish the use of Stochastic Roadmap Simul...
Mehmet Serkan Apaydin, Carlos Guestrin, Chris Varm...