Sciweavers

2429 search results - page 307 / 486
» Using Aspects to Design a Secure System
Sort
View
CHI
2009
ACM
16 years 2 months ago
Extraordinary computing: religion as a lens for reconsidering the home
We present results from a study examining how American Protestant Christians' faith affects their domestic life. There are two contributions of this work for the HCI communit...
Susan Wyche, Rebecca E. Grinter
ICONFERENCE
2012
13 years 9 months ago
No forests without trees: particulars and patterns in visualizing personal communication
When people use visualizations of conversational archives, they typically reflect on particular events, rather than patterns of activity over time. We explore whether this is a fu...
Ou Jie Zhao, Tiffany Ng, Dan Cosley
NSPW
2003
ACM
15 years 7 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
CASES
2008
ACM
15 years 4 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
ICSE
1999
IEEE-ACM
15 years 6 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...