Sciweavers

13224 search results - page 2465 / 2645
» Self-monitoring for Computer Users
Sort
View
CHI
2006
ACM
14 years 8 months ago
Collective creation and sense-making of mobile media
Traditionally, mobile media sharing and messaging has been studied from the perspective of an individual author making media available to other users. With the aim of supporting s...
Antti Salovaara, Giulio Jacucci, Antti Oulasvirta,...
CHI
2005
ACM
14 years 8 months ago
Studying the effectiveness of MOVE: a contextually optimized in-vehicle navigation system
In-vehicle navigation has changed substantially in recent years, due to the advent of computer generated maps and directions. However, these maps are still problematic, due to a m...
Joonhwan Lee, Jodi Forlizzi, Scott E. Hudson
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
HPCA
2002
IEEE
14 years 8 months ago
Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach
Power dissipation has become one of the most critical factors for the continued development of both high-end and low-end computer systems. The successful design and evaluation of ...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Mary J...
CHI
2004
ACM
14 years 8 months ago
Ambient agoras: InfoRiver, SIAM, Hello.Wall
This demonstration reports results from the EU-funded project Ambient Agoras, investigating future applications of ubiquitous and ambient computing in workspaces. Instead of prese...
Thorsten Prante, Richard Stenzel, Carsten Röc...
« Prev « First page 2465 / 2645 Last » Next »