Sciweavers

2135 search results - page 99 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
CSREASAM
2006
13 years 10 months ago
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has ma...
Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni,...
CAD
2005
Springer
13 years 8 months ago
Shape-based searching for product lifecycle applications
Estimates suggest that more than 75% of engineering design activity comprises reuse of previous design knowledge to address a new design problem. Reusing design knowledge has grea...
Natraj Iyer, Subramaniam Jayanti, Kuiyang Lou, Yag...
HUC
2003
Springer
14 years 2 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...
CHI
2009
ACM
14 years 3 days ago
Computer usage in daily life
In this paper we explore the use of computer at home. This work is based on the automatic recording of application focus data in natural situation from a wide representative panel...
Thomas Beauvisage
DAIS
2009
13 years 10 months ago
SoundPark: Towards Highly Collaborative Game Support in a Ubiquitous Computing Architecture
Ubiquitous computing architectures enable interaction and collaboration in multi-user applications. We explore the challenges of integrating the disparate services required in such...
Romain Pellerin, Nicolas Bouillot, Tatiana Pietkie...