Sciweavers

443 search results - page 40 / 89
» Deploying research technology in the home
Sort
View
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
JDCTA
2010
148views more  JDCTA 2010»
13 years 3 months ago
Web Services Supervision System Based on Jade
Web service technology is one of the trend technologies in computer science now, and recently with the rapid growth of web services deployed with the same functionality, many rese...
Ahmed Sallam, Zhiyong Li, Shaimaa Hassan
HUC
2007
Springer
14 years 2 months ago
Rapidly Exploring Application Design Through Speed Dating
Abstract. While the user-centered design methods we bring from humancomputer interaction to ubicomp help sketch ideas and refine prototypes, few tools or techniques help explore di...
Scott Davidoff, Min Kyung Lee, Anind K. Dey, John ...
UCS
2007
Springer
14 years 2 months ago
Activity Recognition Based on Intra and Extra Manipulation of Everyday Objects
Recognizing activities based on an actor’s interaction with everyday objects is an important research approach within ubiquitous computing. We present a recognition approach whic...
Dipak Surie, Fabien Lagriffoul, Thomas Pederson, D...
INAP
2001
Springer
14 years 28 days ago
Defeasible Logic
We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contamin...
Donald Nute