Sciweavers

555 search results - page 85 / 111
» Security Issues for Pervasive Personalized Communication Sys...
Sort
View
CF
2007
ACM
13 years 12 months ago
Accelerating memory decryption and authentication with frequent value prediction
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have...
Weidong Shi, Hsien-Hsin S. Lee
AUIC
2004
IEEE
13 years 11 months ago
Display and Presence Disparity in Mixed Presence Groupware
Mixed Presence Groupware (MPG) supports both colocated and distributed participants working over a shared visual workspace. It does this by connecting multiple single-display grou...
Anthony Tang, Michael Boyle, Saul Greenberg
ASSETS
2008
ACM
13 years 10 months ago
A3: a coding guideline for HCI+autism research using video annotation
Due to the profile of strengths and weaknesses indicative of autism spectrum disorders (ASD), technology may play a key role in ameliorating communication difficulties with this p...
Joshua M. Hailpern, Karrie Karahalios, James Halle...
DIMEA
2008
170views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Embodiment in data sculpture: a model of the physical visualization of information
Information is becoming pervasive in the contemporary society, and is increasingly saturating the visual senses and the cognitive efforts of the lay masses. As our attention for v...
Jack Zhao, Andrew Vande Moere
SOUPS
2009
ACM
14 years 2 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...