Sciweavers

4201 search results - page 92 / 841
» Our Users have Root!
Sort
View
BCSHCI
2009
13 years 9 months ago
Initial explorations into the user experience of 3D file browsing
We present an initial exploration into the usability of 3D file browsing. To explore the 3D file browsing technique design space, we analyzed the existing literature and developed...
Anamary Leal, Chadwick A. Wingrave, Joseph J. LaVi...
DAC
2005
ACM
14 years 9 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
CHI
2006
ACM
14 years 8 months ago
Share and share alike: exploring the user interface affordances of file sharing
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, a...
Stephen Voida, W. Keith Edwards, Mark W. Newman, R...
WISEC
2010
ACM
13 years 8 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
MOBICOM
2012
ACM
11 years 10 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...