Sciweavers

8655 search results - page 1594 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2011
ACM
14 years 1 months ago
Enhancing independence and safety for blind and deaf-blind public transit riders
Blind and deaf-blind people often rely on public transit for everyday mobility, but using transit can be challenging for them. We conducted semi-structured interviews with 13 blin...
Shiri Azenkot, Sanjana Prasain, Alan Borning, Emil...
CHI
2011
ACM
14 years 1 months ago
Designing a phone broadcasting system for urban sex workers in India
In this paper, we present the design, implementation, and deployment of a phone-based broadcasting system designed for reaching out to at-risk populations in urban India. We worke...
Nithya Sambasivan, Julie Weber, Edward Cutrell
CHI
2011
ACM
14 years 1 months ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
IPSN
2011
Springer
14 years 1 months ago
Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a ke...
Matteo Ceriotti, Michele Corrà, Leandro D'O...
IPSN
2011
Springer
14 years 1 months ago
Exploration of path space using sensor network geometry
In a sensor network there are many paths between a source and a destination. An efficient method to explore and navigate in the ‘path space’ can help many important routing p...
Ruirui Jiang, Xiaomeng Ban, Mayank Goswami, Wei Ze...
« Prev « First page 1594 / 1731 Last » Next »