Sciweavers

1949 search results - page 286 / 390
» Protective Interface Specifications
Sort
View
PERCOM
2009
ACM
16 years 3 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
113
Voted
CHI
2008
ACM
16 years 2 months ago
Requirements engineering for home care technology
The focus of this work is the requirements engineering process in the home care domain. The overall aim is to design and document a flexible methodology to facilitate the elicitat...
Marilyn Rose McGee-Lennon
77
Voted
CHI
2008
ACM
16 years 2 months ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
CHI
2007
ACM
16 years 2 months ago
Exploring patterns of social commonality among file directories at work
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...
CHI
2007
ACM
16 years 2 months ago
Decision-making strategies in design meetings
This project aims to further our understanding of the practice of user-centered design (UCD) by observing the argumentation strategies used by designers in faceto-face meetings in...
Erin Friess