Sciweavers

1573 search results - page 231 / 315
» Strong User Authentication
Sort
View
125
Voted
QEST
2010
IEEE
14 years 11 months ago
DTMC Model Checking by SCC Reduction
Discrete-Time Markov Chains (DTMCs) are a widely-used formalism to model probabilistic systems. On the one hand, available tools like PRISM or MRMC offer efficient model checking a...
Erika Ábrahám, Nils Jansen, Ralf Wim...
DSL
2009
14 years 11 months ago
A Haskell Hosted DSL for Writing Transformation Systems
KURE is a Haskell hosted Domain Specific Language (DSL) for writing transformation systems based on rewrite strategies. When writing transformation systems, a significant amount of...
Andy Gill
ACL
2012
13 years 4 months ago
Self-Disclosure and Relationship Strength in Twitter Conversations
In social psychology, it is generally accepted that one discloses more of his/her personal information to someone in a strong relationship. We present a computational framework fo...
JinYeong Bak, Suin Kim, Alice H. Oh
CHI
2008
ACM
16 years 2 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
CHI
2006
ACM
16 years 2 months ago
Tabletop sharing of digital photographs for the elderly
We have recently begun to see hardware support for the tabletop user interface, offering a number of new ways for humans to interact with computers. Tabletops offer great potentia...
Trent Apted, Judy Kay, Aaron J. Quigley