Sciweavers

3016 search results - page 406 / 604
» Disappearing mobile devices
Sort
View
WISEC
2010
ACM
13 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CVPR
2008
IEEE
15 years 12 days ago
Pan, zoom, scan - Time-coherent, trained automatic video cropping
We present a method to fully automatically fit videos in 16:9 format on 4:3 screens and vice versa. It can be applied to arbitrary aspect ratios and can be used to make videos sui...
Thomas Deselaers, Philippe Dreuw, Hermann Ney
CHI
2007
ACM
14 years 10 months ago
Comparing physical, automatic and manual map rotation for pedestrian navigation
It is well-established finding that people find maps easier to use when they are aligned so that "up" on the map corresponds to the user's forward direction. With m...
Will Seager, Danae Stanton Fraser
CHI
2007
ACM
14 years 10 months ago
Momento: support for situated ubicomp experimentation
We present the iterative design of Momento, a tool that provides integrated support for situated evaluation of ubiquitous computing applications. We derived requirements for Momen...
Scott Carter, Jennifer Mankoff, Jeffrey Heer
CHI
2004
ACM
14 years 10 months ago
Using mental load for managing interruptions in physiologically attentive user interfaces
Today's user is surrounded by mobile appliances that continuously disrupt his activities through instant message, email and phone call notifications. In this paper, we presen...
Daniel Chen, Roel Vertegaal