Sciweavers

356 search results - page 60 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
IEAAIE
2011
Springer
12 years 11 months ago
Modeling Users of Crisis Training Environments by Integrating Psychological and Physiological Data
Abstract. This paper describes aspects of a training environment for crisis decision makers who, notoriously, operate in highly stressful and unpredictable situations. Training suc...
Gabriella Cortellessa, Rita D'Amico, Marco Pagani,...
CHI
2009
ACM
14 years 8 months ago
Web search and browsing behavior under poor connectivity
Web search and browsing have been streamlined for a comfortable experience when the network connection is fast. Existing tools, however, are not optimized for scenarios where conn...
Jay Chen, Lakshminarayanan Subramanian, Kentaro To...
OZCHI
2009
ACM
14 years 2 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
TABLETOP
2008
IEEE
14 years 2 months ago
System design for the WeSpace: Linking personal devices to a table-centered multi-user, multi-surface environment
The WeSpace is a long-term project dedicated to the creation of environments supporting walkup and share collaboration among small groups. The focus of our system design has been ...
Hao Jiang, Daniel Wigdor, Clifton Forlines, Chia S...