Katsiaryna Naliuka

According to our database1, Katsiaryna Naliuka authored at least 13 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Viking Ghost Hunt: creating engaging sound design for location-aware applications.
Int. J. Arts Technol., 2013

2010
Design and evaluation of player experience of a location-based mobile game.
Proceedings of the 6th Nordic Conference on Human-Computer Interaction 2010, 2010

A Narrative Architecture for Story-Driven Location-Based Mobile Games.
Proceedings of the New Horizons in Web-Based Learning - ICWL 2010 Workshops, 2010

Design, implementation and evaluation of audio for a location aware augmented reality game.
Proceedings of the Fun and Games, 2010

Supporting immersive location-based games on resource-constrained platforms.
Proceedings of the 7th International Conference on Advances in Computer Entertainment Technology, 2010

2009
Matching in security-by-contract for mobile code.
J. Log. Algebraic Methods Program., 2009

The S3MS.NET Run Time Monitor: Tool Demonstration.
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009

A Security Architecture for Web 2.0 Applications.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

2008
An Inline Monitoring System for .NET Mobile Devices.
Proceedings of the Trust Management II, 2008

Towards Practical Security Monitors of UML Policies for Mobile Applications.
Proceedings of the The Third International Conference on Availability, 2008

2007
ConSpec - A Formal Language for Policy Specification.
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007

Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
Proceedings of the Public Key Infrastructure, 2007

A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007


  Loading...