Sciweavers

1818 search results - page 291 / 364
» How users use access control
Sort
View
CHB
2010
130views more  CHB 2010»
13 years 4 months ago
Building an interaction design pattern language: A case study
Interaction design patterns are a proven way to communicate good design. However, current pattern collections are not sufficiently powerful and generative to be used as a guide fo...
Stefan L. Pauwels, Christian Hübscher, Javier...
ASSETS
2004
ACM
14 years 3 months ago
Text entry from power wheelchairs: edgewrite for joysticks and touchpads
Power wheelchair joysticks have been used to control a mouse cursor on desktop computers, but they offer no integrated text entry solution, confining users to point-and-click or p...
Jacob O. Wobbrock, Brad A. Myers, Htet Htet Aung, ...
CCGRID
2009
IEEE
14 years 5 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...
SOUPS
2010
ACM
14 years 2 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
PERCOM
2010
ACM
14 years 2 months ago
Ad-hoc voice-based group communication
Abstract—People waste many hours driving each day. Although unavoidable, this time can be very boring to motorists. Similar to people taking mass transit who often pass the time ...
Lu Han, Stephen Smaldone, Pravin Shankar, James Bo...