Sciweavers

1818 search results - page 279 / 364
» How users use access control
Sort
View
CHI
2011
ACM
13 years 1 months ago
TapBack: towards richer mobile interfaces in impoverished contexts
Much of the mobile work by HCI researchers explores a future world populated by high-end devices and relatively affluent users. This paper turns to consider the hundreds of milli...
Simon Robinson, Nitendra Rajput, Matt Jones, Anupa...
UIST
2010
ACM
13 years 8 months ago
Multitoe: high-precision interaction with back-projected floors based on high-resolution multi-touch input
Tabletop applications cannot display more than a few dozen on-screen objects. The reason is their limited size: tables cannot become larger than arm's length without giving u...
Thomas Augsten, Konstantin Kaefer, René Meu...
ICPADS
2006
IEEE
14 years 4 months ago
Policy-Directed Data Movement in Grids
One of the guiding principles of the Grid is local (site) autonomy. Resource owners maintain control over their resources even when those resources are part of a larger Grid. In o...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
BMCBI
2006
109views more  BMCBI 2006»
13 years 10 months ago
iHOPerator: user-scripting a personalized bioinformatics Web, starting with the iHOP website
Background: User-scripts are programs stored in Web browsers that can manipulate the content of websites prior to display in the browser. They provide a novel mechanism by which u...
Benjamin M. Good, Edward A. Kawas, Byron Yu-Lin Ku...
MSWIM
2006
ACM
14 years 4 months ago
Performance evaluation of web services invocation over Bluetooth
Mobile devices should allow users to exploit services anytime, without any place restriction and in a transparent way. The Bluetooth technology achieves this feature, by providing...
Vincenzo Auletta, Carlo Blundo, Emiliano De Cristo...