Sciweavers

4747 search results - page 263 / 950
» Application Experience with a Repository System for Informat...
Sort
View
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 16 days ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
MHCI
2005
Springer
14 years 1 months ago
Survey of position location techniques in mobile systems
The growth of mobile technology has made recording of user’s location possible. The systems that intent to use location in order to register user’s movement and to use the gen...
Thanos Manesis, Nikolaos M. Avouris
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
FDG
2009
ACM
14 years 2 months ago
Games for passengers: accounting for motion in location-based applications
Passengers pay attention to the landscape as they move through the environment. We suggest a new type of applications, which adds to that experience. It consider their motion and ...
Liselott Brunnberg, Oskar Juhlin, Anton Gustafsson
PRESENCE
1998
79views more  PRESENCE 1998»
13 years 8 months ago
Navigation System for the Blind: Auditory Display Modes and Guidance
The research we are reporting here is part of our effort to develop a navigation system for the blind. Our long-term goal is to create a portable, self-contained system that will ...
Jack M. Loomis, Reginald G. Golledge, Roberta L. K...