Sciweavers

13618 search results - page 2642 / 2724
» The Newton Operating System
Sort
View
SENSYS
2004
ACM
14 years 1 months ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
14 years 1 months ago
Effective features of algorithm visualizations
Many algorithm visualizations have been created, but little is known about which features are most important to their success. We believe that pedagogically useful visualizations ...
Purvi Saraiya, Clifford A. Shaffer, D. Scott McCri...
UIST
2004
ACM
14 years 1 months ago
A toolkit for managing user attention in peripheral displays
Traditionally, computer interfaces have been confined to conventional displays and focused activities. However, as displays become embedded throughout our environment and daily li...
Tara Matthews, Anind K. Dey, Jennifer Mankoff, Sco...
UIST
2004
ACM
14 years 1 months ago
Citrine: providing intelligent copy-and-paste
We present Citrine, a system that extends the widespread copy-and-paste interaction technique with intelligent transformations, making it useful in more situations. Citrine uses t...
Jeffrey Stylos, Brad A. Myers, Andrew Faulring
WPES
2004
ACM
14 years 1 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
« Prev « First page 2642 / 2724 Last » Next »