Sciweavers

1818 search results - page 298 / 364
» How users use access control
Sort
View
CHI
2003
ACM
14 years 10 months ago
The benefits of physical edges in gesture-making: empirical support for an edge-based unistroke alphabet
People with motor impairments often cannot use a keyboard or a mouse. Our previous work showed that a handheld device, connected to a PC, could be effective for computer access fo...
Jacob O. Wobbrock
ICSE
2007
IEEE-ACM
14 years 10 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
SOUPS
2009
ACM
14 years 4 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
14 years 3 months ago
A First Person IP over HDSL Case Study
As many authors have articulated, the “last mile problem” is often cited as a persistent engineering obstacle in deploying residential broadband solutions. Additionally, some ...
Wayne Smith
IPSN
2003
Springer
14 years 3 months ago
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
Abstract. We demonstrate that it is possible to achieve accurate localization and tracking of a target in a randomly placed wireless sensor network composed of inexpensive componen...
Radhika Nagpal, Howard E. Shrobe, Jonathan Bachrac...