Sciweavers

1240 search results - page 110 / 248
» Trusted Design in FPGAs
Sort
View
CAISE
2006
Springer
15 years 1 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
CHI
2004
ACM
15 years 10 months ago
Deception and design: the impact of communication technology on lying behavior
Social psychology has demonstrated that lying is an important, and frequent, part of everyday social interactions. As communication technologies become more ubiquitous in our dail...
Jeffrey T. Hancock, Jennifer Thom-Santelli, Thomps...
TRUSTBUS
2010
Springer
14 years 8 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen
CSCW
2012
ACM
13 years 5 months ago
Designing a social network to support the independence of young adults with autism
Independence is key to a successful transition to adulthood for individuals with autism. Social support is a crucial factor for achieving adaptive self-help life skills. In this p...
Hwajung Hong, Jennifer G. Kim, Gregory D. Abowd, R...
IJMMS
2008
60views more  IJMMS 2008»
14 years 10 months ago
In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions
Online offences are generally considered as frequent and intentional acts performed by a member with the aim to deceive others. However, an offence may also be unintentional or ex...
Asimina Vasalou, Astrid Hopfensitz, Jeremy V. Pitt