Sciweavers

1443 search results - page 53 / 289
» Aging Users are Still Users
Sort
View
102
Voted
FGCS
2000
104views more  FGCS 2000»
15 years 11 days ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
80
Voted
ICC
2007
IEEE
15 years 6 months ago
Satisfying Elastic Short Term Fairness in High Throughput Wireless Communication Systems with Multimedia Services
Abstract—In this paper we study the problem of providing shortterm access time fairness in wireless communication systems with multimedia services, while still maintaining high s...
Timotheos Kastrinogiannis, Symeon Papavassiliou
AVI
2006
15 years 1 months ago
Interacting with piles of artifacts on digital tables
Designers and architects regularly use piles to organize visual artifacts. Recent efforts have now made it possible for users to create piles in digital systems as well. However, ...
Dzmitry Aliakseyeu, Sriram Subramanian, Andr&eacut...
112
Voted
ISMAR
2006
IEEE
15 years 6 months ago
Viewpoint stabilization for live collaborative video augmentations
We present a method for stabilizing live video from a moving camera for the purpose of a tele-meeting, in which a participant with an AR view onto a shared canvas collaborates wit...
Taehee Lee 0002, Tobias Höllerer
102
Voted
IUI
2004
ACM
15 years 6 months ago
Exploiting emotions to disambiguate dialogue acts
This paper describes an attempt to reveal the user’s intention from dialogue acts, thereby improving the effectiveness of natural interfaces to pedagogical agents. It focuses o...
Wauter Bosma, Elisabeth André