Sciweavers

1991 search results - page 13 / 399
» Trusted Interaction: User Control and System Responsibilitie...
Sort
View
WPES
2003
ACM
14 years 19 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
HUC
2007
Springer
14 years 1 months ago
Users and Batteries: Interactions and Adaptive Energy Management in Mobile Systems
Abstract. Battery lifetime has become one of the top usability concerns of mobile systems. While many endeavors have been devoted to improving battery lifetime, they have fallen sh...
Nilanjan Banerjee, Ahmad Rahmati, Mark D. Corner, ...
SIGMETRICS
2010
ACM
160views Hardware» more  SIGMETRICS 2010»
14 years 6 days ago
RSIO: automatic user interaction detection and scheduling
We present RSIO, a processor scheduling framework for improving the response time of latency-sensitive applications by monitoring accesses to I/O channels and inferring when user ...
Haoqiang Zheng, Jason Nieh
MM
2005
ACM
111views Multimedia» more  MM 2005»
14 years 28 days ago
A flexible system for creating music while interacting with the computer
Music is a very important part of our lives. People enjoy listening to the music, and many of us find a special pleasure in creating the music. Computers further extended many asp...
Zeljko Obrenovic
CHI
2005
ACM
14 years 7 months ago
'User experience' design a new form of design practice takes shape
This paper outlines my professional background and interests in the `user-experience' field. I summarise my current relevant responsibilities related to my employment as a sp...
Ian McClelland