Sciweavers

3016 search results - page 597 / 604
» Disappearing mobile devices
Sort
View
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 9 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
CHI
2008
ACM
13 years 9 months ago
Implicit user-adaptive system engagement in speech and pen interfaces
As emphasis is placed on developing mobile, educational, and other applications that minimize cognitive load on users, it is becoming more essential to base interface design on im...
Sharon L. Oviatt, Colin Swindells, Alexander M. Ar...
BCSHCI
2007
13 years 9 months ago
An empirical investigation into dual-task trade-offs while driving and dialing
Engaging in a secondary task, such as dialing a cell phone, while driving a car has been found to have a deleterious effect on driver performance. A point often overlooked though ...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
NSDI
2010
13 years 9 months ago
EndRE: An End-System Redundancy Elimination Service for Enterprises
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design ...
Bhavish Agarwal, Aditya Akella, Ashok Anand, Athul...
AVI
2004
13 years 9 months ago
A visual tool for tracing users' behavior in Virtual Environments
Although some guidelines (e.g., based on architectural principles) have been proposed for designing Virtual Environments (VEs), several usability problems can be identified only b...
Luca Chittaro, Lucio Ieronutti