Sciweavers

903 search results - page 122 / 181
» Usability inspection methods
Sort
View
80
Voted
HCSE
2010
14 years 8 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 5 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
ICASSP
2011
IEEE
14 years 1 months ago
Microphone position optimization for planar superdirective beamforming
The performance of a fixed beamformer highly depends on the position of the microphones in the array. In this paper, different heuristic optimisation approaches for arbitrary pla...
Ina Kodrasi, Thomas Rohdenburg, Simon Doclo
93
Voted
PERCOM
2011
ACM
14 years 1 months ago
On-body device localization for health and medical monitoring applications
—We present a technique to discover the position of sensors on the human body. Automatic on-body device localization ensures correctness and accuracy of measurements in health an...
Alireza Vahdatpour, Navid Amini, Majid Sarrafzadeh
90
Voted
CVPR
2007
IEEE
16 years 5 days ago
3D Pose Estimation Based on Multiple Monocular Cues
In this study we propose an integrated approach to the problem of 3D pose estimation. The main difference to the majority of known methods is the usage of complementary image info...
Björn Barrois, Christian Wöhler