Sciweavers

UM
2009
Springer
14 years 6 months ago
Recognition of Users' Activities Using Constraint Satisfaction
Ideally designed software allow users to explore and pursue interleaving plans, making it challenging to automatically recognize user interactions. The recognition algorithms prese...
Swapna Reddy, Ya'akov Gal, Stuart M. Shieber
PERCOM
2004
ACM
14 years 11 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
CHI
2006
ACM
14 years 12 months ago
Making memories: applying user input logs to interface design and evaluation
In this paper, we describe our approach to designing interface components that automate the logging of user input. These recorded logs of user-system interactions can serve as a b...
Tamara Babaian, Wendy T. Lucas, Heikki Topi