Search alternatives:
22weak interaction » weak interactions, wear interaction, work interaction
weak interaction » weak interactions

1
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Multimodal Human Computer Interaction: A Survey -- Multimodal Human Computer Interaction: A Survey...

2
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Papers -- Universal Interaction Systems with Only Two Agents -- General Recursion on Second Order Term...

3
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... Strategies -- Rewrite Games -- An Extensional Böhm Model -- A Weak Calculus with Explicit Operators...

4
Published 1996
Springer Berlin Heidelberg
Table of Contents: ... and Anonymous Cash -- Asymmetric Systems -- Weaknesses in Some Threshold Cryptosystems -- Hidden Collisions...

5
Published 1994
Springer Berlin Heidelberg
Table of Contents: ... and Their Propagation Characteristics -- Proof Systems and Zero-knowledge -- A Low Communication Competitive Interactive...

6
Published 1995
Springer Berlin Heidelberg
Table of Contents: ... library for constructing interactive graphical user interfaces -- Model-based computing: Using concurrent...

7
Published 2021
O'Reilly Media, Inc.
Table of Contents: ... -- Al Lopez -- Chapter 21. Advocate for Accessibility -- Holly Schroeder -- Chapter 22. Design...

8
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... of Independence-Friendly Fixpoint Logic -- Closure Properties of Weak Systems of Bounded Arithmetic...

9
Published 2019
Springer International Publishing
Table of Contents: ... Weak Pseudorandomness and Security Amplification -- Watermarking -- Watermarking PRFs from Lattices...

10
Published 2019
Springer International Publishing
Table of Contents: ... Languages: Extended Case Study -- Technology Enhanced Support for Learning Interactive Software Systems...

11
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...User Authentication -- Interactive Diffie-Hellman Assumptions with Applications to Password-Based...

12
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... and Interacting Particle Systems -- Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration...

13
by Gallagher, Tom
Published 2006
Microsoft Press
Table of Contents: ... Testing; 2.1 Threat Modeling; 2.2 How Testers Can Leverage a Threat Model; 2.3 Data Flow Diagrams; 2.4...

14
by Brumfield, Cynthia, Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...-Factor Authentication Based on the Risk Involved in the Interaction 33 -- III. Awareness and Training 34...