Sciweavers

903 search results - page 117 / 181
» Usability inspection methods
Sort
View
92
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
NORDICHI
2004
ACM
15 years 3 months ago
Marrying HCI/Usability and computer games: a preliminary look
The fields HCI/usability and computer games have existed for a few decades with virtually no mutual interaction. However, in recent years, a number of exchanges have appeared, bot...
Anker Helms Jørgensen
COGNITIVE
2001
Springer
15 years 2 months ago
Virtual Reality in Surgery: Between Satisfaction and Stress
The present study is focused on usability issues related to laparoscopy, emphasizing the surgeon’s overall satisfaction with the mediated perception of reality. We were particul...
Corina Sas, Ronan Reilly, Gregory M. P. O'Hare
73
Voted
WETICE
2000
IEEE
15 years 2 months ago
Towards an Evaluation Methodology for the Development of Research-Oriented Virtual Communities
A virtual community is a group of people whose shared needs and/or interests are largely communicated within, and mediated by Webenabled interactions, e.g., within a Website. Whil...
Janet Ho, Monica M. C. Schraefel, Mark H. Chignell
HOTOS
1997
IEEE
15 years 2 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley