Sciweavers

WISEC
2010
ACM
13 years 4 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
IADIS
2004
13 years 6 months ago
The Impact of Personality and Learning Styles on the Use of Laptop Computers in the Classroom
Past studies indicate that classes that utilize laptop technology in the classroom have higher scores on graded assignments than those who do not. Despite this finding, some stude...
Jamie Efaw, Jennifer Bailey
SIGUCCS
2000
ACM
13 years 8 months ago
Implementing and Supporting a Wireless Classroom
This paper discusses the challenges in setting up and supporting a seminar style wireless laptop classroom. Keywords Wireless, classroom, laptop, iBook, Airport, 802.11b
Linda Iroff, Barbara Sawhill
INFOCOM
2008
IEEE
13 years 11 months ago
Delay Tolerant Collaborations among Campus-Wide Wireless Users
Abstract—The ubiquitous deployment of wireless LAN networks are allowing students to embrace laptops as their preferred computing platform. We investigated the viability of build...
Xuwen Yu, Surendar Chandra
UIST
2009
ACM
13 years 11 months ago
Bonfire: a nomadic system for hybrid laptop-tabletop interaction
We present Bonfire, a self-contained mobile computing system that uses two laptop-mounted laser micro-projectors to project an interactive display space to either side of a laptop...
Shaun K. Kane, Daniel Avrahami, Jacob O. Wobbrock,...