Sciweavers

3693 search results - page 122 / 739
» User experience over time
Sort
View
CSREASAM
2006
13 years 10 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 3 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 2 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
LOCA
2005
Springer
14 years 2 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz
INTERACT
2003
13 years 10 months ago
Milestones in Time: The Value of Landmarks in Retrieving Information from Personal Stores
: We describe the design and analysis of timeline visualizations for displaying the results of queries on an index of personal content. The visualization was built on top of a pers...
Meredith Ringel, Edward Cutrell, Susan T. Dumais, ...