Sciweavers

1303 search results - page 255 / 261
» Ambient Information Systems: Evaluation in Two Paradigms
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
SENSYS
2005
ACM
15 years 5 months ago
Intelligent light control using sensor networks
Increasing user comfort and reducing operation costs have always been two primary objectives of building operations and control strategies. Current building control strategies are...
Vipul Singhvi, Andreas Krause, Carlos Guestrin, Ja...
CCS
2008
ACM
15 years 1 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
BCSHCI
2009
15 years 23 days ago
Measuring the influence of social abilities on acceptance of an interface robot and a screen agent by elderly users
Personal robots and screen agents can be equipped with social abilities to facilitate interaction. This paper describes our research on the influence of these abilities on elderly...
Marcel Heerink, Ben J. A. Kröse, Bob J. Wieli...
ACMDIS
2010
ACM
14 years 12 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton