Sciweavers

8655 search results - page 387 / 1731
» Challenges for Trusted Computing
Sort
View
164
Voted
PERCOM
2006
ACM
16 years 3 months ago
Towards Wide Area Context-Aware Environments
In the vision of ubiquitous computing, there are billions of context sources that continuously publish their contextual information, and even more user agents that search for and ...
Yong Liu, Kay Connelly
IPPS
2010
IEEE
15 years 1 months ago
Performance improvements of real-time crowd simulations
The current challenge for crowd simulations is the design and development of a scalable system that is capable of simulating the individual behavior of millions of complex agents ...
Guillermo Vigueras, Juan M. Orduña, Miguel ...
CHI
2011
ACM
14 years 7 months ago
From the lab to the world: lessons from extending a pointing technique for real-world use
We present the Pointing Magnifier as a case study for understanding the issues and challenges of deploying lab-validated pointing facilitation techniques into the real world. The ...
Alex Jansen, Leah Findlater, Jacob O. Wobbrock
123
Voted
CHI
2009
ACM
16 years 4 months ago
Resilience through technology adoption: merging the old and the new in Iraq
Little attention has been given to how citizens use technology to be resilient when their country is at war. We report on an ethnographic interview study of how technology was ado...
Gloria Mark, Ban Al-Ani, Bryan Semaan
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
16 years 4 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...