Sciweavers

973 search results - page 144 / 195
» Personal Tele-Immersion Devices
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
HICSS
2006
IEEE
104views Biometrics» more  HICSS 2006»
14 years 4 months ago
Extending the Use of Games in Health Care
Digital games have the ability to engage both children and adults alike. We are exploring the use of games for children with long term treatment regimes, where motivation for comp...
Carolyn R. Watters, Michael A. Shepherd, Azza Abou...
ICMCS
2006
IEEE
82views Multimedia» more  ICMCS 2006»
14 years 4 months ago
PING: a Group-to-Individual Distributed Meeting System
Group-to-individual (G2I) distributed meeting is an important but understudied area. Because of the asymmetry between different parties in G2I meetings, it has two unique challeng...
Yong Rui, Eric Rudolph, Li-wei He, Rico Malvar, Mi...
IEEECIT
2006
IEEE
14 years 4 months ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
ACMACE
2006
ACM
14 years 4 months ago
Interaction techniques for musical performance with tabletop tangible interfaces
We present a set of interaction techniques for electronic musical performance using a tabletop tangible interface. Our system, the Audiopad, tracks the positions of objects on a t...
James Patten, Ben Recht, Hiroshi Ishii