Sciweavers

16160 search results - page 104 / 3232
» How to approach humans
Sort
View
JCS
2011
126views more  JCS 2011»
13 years 3 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
HCI
2009
13 years 6 months ago
Interactive Game Based Learning: Advantages and Disadvantages
Abstract. Interactive Game-Based Learning might be used to raise the awareness of students concerning questions of sustainability. Sustainability is a very complex topic. By intera...
Margit Pohl, Markus Rester, Peter Judmaier
MHCI
2009
Springer
14 years 2 months ago
Kartta: extracting landmarks near personalized points-of-interest from user generated content
Most mobile navigation systems focus on answering the question, “I know where I want to go, now can you show me exactly how to get there?” While this approach works well for m...
Arttu Perttula, Scott Carter, Laurent Denoue
TABLETOP
2008
IEEE
14 years 2 months ago
Contextual design considerations for co-located, collaborative tables
To date, digital tabletop research has predominantly focused on resolving fundamental software and hardware challenges introduced by this new interactive platform. Understanding n...
James R. Wallace, Stacey D. Scott
EUROITV
2007
Springer
14 years 2 months ago
Psychological Backgrounds for Inducing Cooperation in Peer-to-Peer Television
Television and the Internet have proven to be a popular combination for both broadcasters and viewers. Because of this popularity they are increasingly facing the consequences of c...
Jenneke Fokker, Huib de Ridder, Piet Westendorp, J...