Sciweavers

1610 search results - page 293 / 322
» A Transaction Model for Mobile Computing
Sort
View
IUI
2010
ACM
14 years 5 months ago
Evaluating the design of inclusive interfaces by simulation
We have developed a simulator to help with the design and evaluation of assistive interfaces. The simulator can predict possible interaction patterns when undertaking a task using...
Pradipta Biswas, Peter Robinson
EICS
2009
ACM
14 years 3 months ago
TnToolkit: a design and analysis tool for ambiguous, QWERTY, and on-screen keypads
The pervasive use of ambiguous keypads for mobile text entry necessitates examination of their performance characteristics. This paper presents TnToolkit – a self-contained tool...
Steven J. Castellucci, I. Scott MacKenzie
ICPP
2006
IEEE
14 years 3 months ago
Social Welfare Based Routing in Ad hoc Networks
— Due to resource scarcity, a paramount concern in ad hoc networks is to utilize the limited resources efficiently. The self-organized nature of ad hoc networks makes the social...
Mingming Lu, Jie Wu
IPPS
2006
IEEE
14 years 3 months ago
Battery aware dynamic scheduling for periodic task graphs
Battery lifetime, a primary design constraint for mobile embedded systems, has been shown to depend heavily on the load current profile. This paper explores how scheduling guidel...
V. Rao, N. Navet, G. Singhal, A. Kumar, G. S. Visw...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee