Communication software

Results: 13572



#Item
651Usability / Humancomputer interaction / Design / Academia / Technical communication / Software testing / Web design / Web accessibility / Abstract / Usability engineering / User experience design

Preparing a JUS Manuscript: Guidelines for Authors Joseph Dumas Co-Editor in Chief Journal of Usability Studies Dinara Saparova

Add to Reading List

Source URL: uxpajournal.org

Language: English - Date: 2015-06-13 09:58:56
652Usability / Humancomputer interaction / Technical communication / Technology / Human communication / Design / Software testing / User interfaces / User experience / User-centered design / User interface design

From The UPA Voice, June 2005 Thumbnail: Ginny Redish by Clifford Anderson Senior Usability Engineer Wachovia Bank, Charlotte, North Carolina Ginny Redish has been called the “mother” of usability. With

Add to Reading List

Source URL: redish.net

Language: English - Date: 2016-01-04 12:20:12
653Humancomputer interaction / Software / Technical communication / Usability / Alert messaging / User interface / PlayStation Home / Interpersonal communication / Human communication

Evaluation of Zetoc: An Awareness and ‘Join Up’ Service

Add to Reading List

Source URL: zetoc.jisc.ac.uk

Language: English - Date: 2015-07-28 18:50:18
654Artificial neural networks / Applied mathematics / Human communication / Artificial intelligence / Computational neuroscience / Computational linguistics / Deep learning / Perception / Speech recognition / Lip reading / Multimodal learning / DBm

Listening With Your Eyes: Towards a Practical Visual Speech Recognition System Using Deep Boltzmann Machines Chao Sui, Mohammed Bennamoun School of Computer Science and Software Engineering University of Western Australi

Add to Reading List

Source URL: www.cv-foundation.org

Language: English - Date: 2015-10-24 14:58:31
655Cyberwarfare / Computer security / Security / Computer network security / Software testing / Hacking / Cryptography / Secure communication / Vulnerability

Subject: Request to Attend Trail of Bits Training Dear [DECISION MAKER], I would like to request approval to attend a Trail of Bits training course, taking place from [DATES] in [CITY]. The program offers comprehensive,

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:18
656Software / Graphic design / Communication design / Adobe Photoshop / Password / Digital ticket / Prevention

Tim Kjær Lange UX LEAD · UNWIRE The fraud proof ticket PROBLEM Ticket fraud is a huge revenue drain on public transit companies. SOLUTION Create a digital ticket that makes fraud extremely cumbersome.

Add to Reading List

Source URL: www.timkl.com

Language: English - Date: 2016-03-06 21:32:58
657Software / Computer architecture / System software / System calls / Inter-process communication / Application programming interfaces / Kernel / Seccomp / HAL / Chroot / Sandbox / Potential applications of graphene

Cooperation and Security Isolation of Library OSes for Multi-Process Applications Chia-Che Tsai Kumar Saurabh Arora Nehal Bandi Bhushan Jain

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2014-03-28 07:32:49
658Internet / Computing / Network architecture / Internet security / Secure communication / Content delivery network / Tor / Dark web / Cloudflare / CAPTCHA / The Tor Project /  Inc / Facebookcorewwwi.onion

Fact Sheet: Cloud Flare and the Tor Project What is the Tor Project? The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software to help millions of people defend against onl

Add to Reading List

Source URL: people.torproject.org

Language: English - Date: 2016-03-31 13:39:58
659Cryptography / Computing / Secure communication / Cryptographic protocols / Internet protocols / E-commerce / Cryptographic software / Transport Layer Security / Cipher suite / OpenSSL / RSA / HTTPS

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager Jörg Schwenk

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-08-21 05:45:15
660Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 06:14:04
UPDATE