Sciweavers

562 search results - page 23 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
CHI
2007
ACM
16 years 4 months ago
A study of emergency response work: patterns of mobile phone interaction
This paper presents descriptive accounts of time-critical organizing in the domain of emergency response. Patterns of mobile phone interaction in such work is analyzed showing how...
Jonas Landgren, Urban Nulden
SIGMOD
2010
ACM
144views Database» more  SIGMOD 2010»
15 years 8 months ago
Interactive visual exploration of neighbor-based patterns in data streams
We will demonstrate our system, called V iStream, supporting interactive visual exploration of neighbor-based patterns [7] in data streams. V istream does not only apply innovativ...
Di Yang, Zhenyu Guo, Zaixian Xie, Elke A. Rundenst...
WPES
2004
ACM
15 years 9 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
ACMDIS
2000
ACM
15 years 8 months ago
A Pattern Approach to Interaction Design
To create successful interactive systems, user interface designers need to cooperate with developers and application domain experts in an interdisciplinary team. These groups, how...
Jan O. Borchers
CHI
2007
ACM
16 years 4 months ago
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition
Sensors are becoming increasingly important in interaction design. Authoring a sensor-based interaction comprises three steps: choosing and connecting the appropriate hardware, cr...
Björn Hartmann, Leith Abdulla, Manas Mittal, ...