September/October 2018 issue of acmqueue The September/October issue of acmqueue is out now

Subscribers and ACM Professional members login here



Opinion

HCI

  Download PDF version of this article PDF

Error 526 Ray ID: 47b981382b2821b0 • 2018-11-18 09:45:32 UTC

Invalid SSL certificate

You

Browser

Working
Newark

Cloudflare

Working
deliverybot.acm.org

Host

Error

What happened?

The origin web server does not have a valid SSL certificate.

What can I do?

If you're a visitor of this website:

Please try again in a few minutes.

If you're the owner of this website:

The SSL certificate presented by the server did not pass validation. This could indicate an expired SSL certificate or a certificate that does not include the requested domain name. Please contact your hosting provider to ensure that an up-to-date and valid SSL certificate issued by a Certificate Authority is configured for this domain name on the origin server. Additional troubleshooting information here.

acmqueue

Originally published in Queue vol. 2, no. 7
see this item in the ACM Digital Library


Tweet


Related:

Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov - Realtime Computer Vision with OpenCV
Mobile computer-vision technology will soon become as ubiquitous as touch interfaces.


Julian Harty - Finding Usability Bugs with Automated Tests
Automated usability tests can be valuable companions to in-person tests.


Jim Christensen, Jeremy Sussman, Stephen Levy, William E. Bennett, Tracee Vetting Wolf, Wendy A. Kellogg - Too Much Information
Two applications reveal the key challenges in making context-aware computing a reality. As mobile computing devices and a variety of sensors become ubiquitous, new resources for applications and services - often collectively referred to under the rubric of context-aware computing - are becoming available to designers and developers. In this article, we consider the potential benefits and issues that arise from leveraging context awareness in new communication services that include the convergence of VoIP (voice over IP) and traditional information technology.


Gaetano Borriello - The Invisible Assistant
One lab's experiment with ubiquitous computing



Comments

(newest first)

pwanidi elias | Thu, 24 Jun 2010 13:42:38 UTC

i am nigerian, a student and i want to deliver a seminer in relation to election and voting system considering the fact that my country is fast approching election peroid and nigeria as black nation battling with the issue of chosing their leader which resulted to poverty,corruption,lack of security e.t.c.pls i want to use electtronic voting system as my topic and nigeria as my case study.i need a guideline you can post it through my mail thanks.


Rudolf Scheutz | Sun, 10 Jan 2010 07:14:32 UTC

Computer-/communication networks are the most dangerous endeavor mankind has begun so far. It is not very difficult for unauthorized non/humans to read, create, modify and delete data on them. Traditional information may be electronically contaminated. Very bad further effect: this is a creativity killer.


Leave this field empty

Post a Comment:







© 2018 ACM, Inc. All Rights Reserved.