Sciweavers

2821 search results - page 18 / 565
» Tracing a single user
Sort
View
AVI
2010
13 years 10 months ago
Knotty gestures: subtle traces to support interactive use of paper
We introduce the knotty gesture, a simple yet powerful technique for interacting with paper. Knots are tiny circles that can be added to any gesture. Users can leave subtle marks ...
Theophanis Tsandilas, Wendy E. Mackay
CCR
2010
81views more  CCR 2010»
13 years 9 months ago
Perspectives on tracing end-hosts: a survey summary
There is an amazing paucity of data that is collected directly on users' personal computers. One key reason for this is the perception among researchers that users are unwill...
Diana Joumblatt, Renata Teixeira, Jaideep Chandras...
EUROPKI
2004
Springer
14 years 2 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
CGO
2005
IEEE
14 years 2 months ago
Automatic Generation of High-Performance Trace Compressors
Program execution traces are frequently used in industry and academia. Yet, most trace-compression algorithms have to be re-implemented every time the trace format is changed, whi...
Martin Burtscher, Nana B. Sam
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech