Sciweavers

1443 search results - page 140 / 289
» Aging Users are Still Users
Sort
View
CSFW
2006
IEEE
15 years 6 months ago
Information-Flow Security for Interactive Programs
Abstract. Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about...
Kevin R. O'Neill, Michael R. Clarkson, Stephen Cho...
ICAT
2006
IEEE
15 years 6 months ago
An Initialization Tool for Installing Visual Markers in Wearable Augmented Reality
Abstract. It is necessary to precisely measure pose (position and orientation) of a user in order to realize an augmented reality (AR) system with a wearable computer. One of major...
Yusuke Nakazato, Masayuki Kanbara, Naokazu Yokoya
97
Voted
IEEECIT
2006
IEEE
15 years 6 months ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
132
Voted
ACMDIS
2006
ACM
15 years 6 months ago
Storyboarding: an empirical determination of best practices and effective guidelines
Storyboarding is a common technique in HCI and design for demonstrating system interfaces and contexts of use. Despite its recognized benefits, novice designers still encounter ch...
Khai N. Truong, Gillian R. Hayes, Gregory D. Abowd
MOBICOM
2006
ACM
15 years 6 months ago
A software architecture for physical layer wireless network emulation
Despite their widespread deployment, many aspects of wireless network performance are poorly understood, and there is great room from improvement in wireless network reliability a...
Glenn Judd, Peter Steenkiste