Sciweavers

1627 search results - page 310 / 326
» On context in authorization policy
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 2 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
AUTOMOTIVEUI
2009
ACM
14 years 2 months ago
Usability evaluation of a Volkswagen Group in-vehicle speech system
Driving behavior has been trending towards more time in the car and longer commutes. This has fueled the demand for an increasing number of in-vehicle infotainment features, at th...
Jackie C. Chang, Annie Lien, Brian Lathrop, Holger...
DOCENG
2009
ACM
14 years 2 months ago
Deriving image-text document surrogates to optimize cognition
The representation of information collections needs to be optimized for human cognition. While documents often include rich visual components, collections, including personal coll...
Eunyee Koh, Andruid Kerne
CHI
2010
ACM
14 years 2 months ago
Physical activity motivating games: virtual rewards for real activity
Contemporary lifestyle has become increasingly sedentary: little physical (sports, exercises) and much sedentary (TV, computers) activity. The nature of sedentary activity is self...
Shlomo Berkovsky, Mac Coombe, Jill Freyne, Dipak B...
CDC
2008
IEEE
14 years 2 months ago
Retroactivity attenuation in transcriptional networks: Design and analysis of an insulation device
— Retroactivity is a parasitic phenomenon that changes the desired input/output response of a system when it is connected to “downstream” systems. Downstream and upstream ref...
Domitilla Del Vecchio, Shridhar Jayanthi