Sciweavers

193 search results - page 21 / 39
» Activity Theory and System Design: A View from the Trenches
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
AINA
2006
IEEE
13 years 11 months ago
Using Managed Communication Channels in Software Components
The paper discusses the potential usage of principles from General System Theory (GST) and Cybernetics for design of Autonomic Software. Motivated by the characteristics of open s...
Emil A. Stoyanov, Dieter Roller, Markus Alexander ...
HUC
2000
Springer
13 years 11 months ago
Notable: At the Intersection of Annotations and Handheld Technology
The Notable annotation system enables users to annotate paper documents using handheld devices in a mobile environment. This paper describes the design issues and solutions that a...
Michelle Q. Wang Baldonado, Steve B. Cousins, Jace...
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 1 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
CHI
2005
ACM
14 years 8 months ago
Artful systems in the home
In this paper we introduce the idea of organizing systems. Through a number of examples from an ongoing ethnographic study of family life, we suggest that organizing systems come ...
Alex S. Taylor, Laurel Swan