Sciweavers

2713 search results - page 73 / 543
» Designing Personal Tele-Embodiment
Sort
View
KDD
2006
ACM
253views Data Mining» more  KDD 2006»
14 years 8 months ago
Adaptive Website Design Using Caching Algorithms
Visitors enter a website through a variety of means, including web searches, links from other sites, and personal bookmarks. In some cases the first page loaded satisfies the visi...
Justin Brickell, Inderjit S. Dhillon, Dharmendra S...
CHI
2006
ACM
14 years 8 months ago
Sashay: designing for wonderment
No longer confined to our offices, schools, and homes, technology is expanding at an astonishing rate across our everyday public urban landscapes. From the visible (mobile phones,...
Eric Paulos, Chris Beckmann
APNOMS
2006
Springer
13 years 11 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
DNIS
2010
Springer
194views Database» more  DNIS 2010»
14 years 2 months ago
Interface Tailoring by Exploiting Temporality of Attributes for Small Screens
In the pervasive computing era, mobile phones and personal digital assistants are widely used for data collection. The traditional user interfaces which are employed for data colle...
Mittapally Kumara Swamy, P. Krishna Reddy, R. Uday...
FC
2007
Springer
104views Cryptology» more  FC 2007»
14 years 2 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen