Sciweavers

3042 search results - page 64 / 609
» Designing for all users: including the odd users
Sort
View
CCS
1999
ACM
14 years 1 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
WICON
2008
13 years 10 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
NORDICHI
2004
ACM
14 years 2 months ago
Survey on the UCD integration in the industry
The primary contribution of this paper is investigating how the User Centered Design approach is integrated into the industry. Employing a structured web-survey, targeted to the u...
Giorgio Venturi, Jimmy Troost
MHCI
2007
Springer
14 years 3 months ago
Understanding human-battery interaction on mobile phones
Mobile phone users have to deal with limited battery lifetime through a reciprocal process we call human-battery interaction (HBI). We conducted three user studies in order to und...
Ahmad Rahmati, Angela Qian, Lin Zhong
GLOBECOM
2009
IEEE
14 years 3 months ago
Capacity Impact of Location-Aware Cognitive Sensing
— We study Bayesian detection based cognitive sensing and analyze its impact on the capacity in various cases of location information. In a network of one primary and one cogniti...
Peng Jia, Mai Vu, Tho Le-Ngoc