Sciweavers

1573 search results - page 231 / 315
» Strong User Authentication
Sort
View
QEST
2010
IEEE
15 years 21 days ago
DTMC Model Checking by SCC Reduction
Discrete-Time Markov Chains (DTMCs) are a widely-used formalism to model probabilistic systems. On the one hand, available tools like PRISM or MRMC offer efficient model checking a...
Erika Ábrahám, Nils Jansen, Ralf Wim...
DSL
2009
15 years 19 days ago
A Haskell Hosted DSL for Writing Transformation Systems
KURE is a Haskell hosted Domain Specific Language (DSL) for writing transformation systems based on rewrite strategies. When writing transformation systems, a significant amount of...
Andy Gill
ACL
2012
13 years 5 months ago
Self-Disclosure and Relationship Strength in Twitter Conversations
In social psychology, it is generally accepted that one discloses more of his/her personal information to someone in a strong relationship. We present a computational framework fo...
JinYeong Bak, Suin Kim, Alice H. Oh
CHI
2008
ACM
16 years 3 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
CHI
2006
ACM
16 years 3 months ago
Tabletop sharing of digital photographs for the elderly
We have recently begun to see hardware support for the tabletop user interface, offering a number of new ways for humans to interact with computers. Tabletops offer great potentia...
Trent Apted, Judy Kay, Aaron J. Quigley