Sciweavers

86 search results - page 11 / 18
» Using Automatic Tools in Accessibility and Usability Assuran...
Sort
View
WWW
2008
ACM
15 years 10 months ago
WWW 2008 workshop: NLPIX2008 summary
The amount of information available on the Web has increased rapidly, reaching levels that few would ever have imagined possible. We live in what could be called the "informa...
Hiroshi Nakagawa, Kentaro Torisawa, Marasu Kitsure...
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 5 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
80
Voted
ACSAC
2007
IEEE
15 years 3 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
CHI
2002
ACM
15 years 10 months ago
Technologies for families
We describe the design and use of a system facilitating the sharing of calendar information between remotely located, multi-generational family members. Most previous work in this...
Catherine Plaisant, Allison Druin, Hilary Hutchins...
HCI
2007
14 years 11 months ago
User Expectations from Dictation on Mobile Devices
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...