Sciweavers

722 search results - page 98 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
SASN
2004
ACM
15 years 5 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
ISI
2010
Springer
14 years 10 months ago
Measuring behavioral trust in social networks
Abstract—Trust is an important yet complex and little understood dyadic relation among actors in a social network. There are many dimensions to trust; trust plays an important ro...
Sibel Adali, Robert Escriva, Mark K. Goldberg, Myk...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 5 months ago
The Mobile Internet: The Pioneering Users' Adoption Decisions
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Ann Fogelgren-Pedersen
BCSHCI
2007
15 years 1 months ago
Ten emotion heuristics: guidelines for assessing the user's affective dimension easily and cost-effectively
Emotional appeal is a key dimension in user experience that often goes unmeasured in most user-centered design projects. This paper presents preliminary work for developing a set ...
Eva de Lera, Muriel Garreta Domingo
CHI
2008
ACM
16 years 7 days ago
Peephole pointing: modeling acquisition of dynamically revealed targets
Peephole interaction occurs when a spatially aware display is moved and acts as a viewport to reveal different parts of the virtual space that cannot all fit within the display at...
Xiang Cao, Jacky Jie Li, Ravin Balakrishnan