Sciweavers

343 search results - page 26 / 69
» User experience evaluation: do you know which method to use
Sort
View
PERVASIVE
2007
Springer
14 years 2 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
IEEEARES
2010
IEEE
14 years 2 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
VR
2008
IEEE
173views Virtual Reality» more  VR 2008»
14 years 2 months ago
Rapid Creation of Large-scale Photorealistic Virtual Environments
The rapid and efficient creation of virtual environments has become a crucial part of virtual reality applications. In particular, civil and defense applications often require an...
Charalambos Poullis, Suya You, Ulrich Neumann
JUCS
2008
132views more  JUCS 2008»
13 years 7 months ago
Searching ... in a Web
: Search engines--"web dragons"--are the portals through which we access society's treasure trove of information. They do not publish the algorithms they use to sort...
Ian H. Witten
IDEAL
2007
Springer
14 years 2 months ago
Extracting Meaningful Contexts from Mobile Life Log
Life logs include people's experiences collected from various sources. It is used to support user's memory. There are many studies that collect and store life log for per...
Youngseol Lee, Sung-Bae Cho