Sciweavers

3042 search results - page 64 / 609
» Designing for all users: including the odd users
Sort
View
CCS
1999
ACM
15 years 6 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
WICON
2008
15 years 3 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
NORDICHI
2004
ACM
15 years 7 months ago
Survey on the UCD integration in the industry
The primary contribution of this paper is investigating how the User Centered Design approach is integrated into the industry. Employing a structured web-survey, targeted to the u...
Giorgio Venturi, Jimmy Troost
MHCI
2007
Springer
15 years 7 months ago
Understanding human-battery interaction on mobile phones
Mobile phone users have to deal with limited battery lifetime through a reciprocal process we call human-battery interaction (HBI). We conducted three user studies in order to und...
Ahmad Rahmati, Angela Qian, Lin Zhong
GLOBECOM
2009
IEEE
15 years 8 months ago
Capacity Impact of Location-Aware Cognitive Sensing
— We study Bayesian detection based cognitive sensing and analyze its impact on the capacity in various cases of location information. In a network of one primary and one cogniti...
Peng Jia, Mai Vu, Tho Le-Ngoc