Sciweavers

3693 search results - page 122 / 739
» User experience over time
Sort
View
CSREASAM
2006
15 years 4 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
155
Voted
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 9 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
131
Voted
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 9 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
115
Voted
LOCA
2005
Springer
15 years 9 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
INTERACT
2003
15 years 4 months ago
Milestones in Time: The Value of Landmarks in Retrieving Information from Personal Stores
: We describe the design and analysis of timeline visualizations for displaying the results of queries on an index of personal content. The visualization was built on top of a pers...
Meredith Ringel, Edward Cutrell, Susan T. Dumais, ...