Sciweavers

1460 search results - page 203 / 292
» Meeting people where they are
Sort
View
CHI
2009
ACM
16 years 13 days ago
Reflections of everyday activities in spending data
In this paper we show that financial information can be used to sense many aspects of human activity. This simple technique gives people information about their daily lives, is ea...
Julia Schwarz, Jennifer Mankoff, H. Scott Matthews
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 12 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
73
Voted
CHI
2008
ACM
16 years 7 days ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
CHI
2007
ACM
16 years 7 days ago
Social dynamics of early stage co-design in developing regions
Technology arguably has the potential to play a key role in improving the lives of people in developing regions. However, these communities are not well understood and designers m...
Divya Ramachandran, Matthew Kam, Jane Chiu, John F...
CHI
2007
ACM
16 years 7 days ago
Koala: capture, share, automate, personalize business processes on the web
We present Koala, a system that enables users to capture, share, automate, and personalize business processes on the web. Koala is a collaborative programming-bydemonstration syst...
Greg Little, Tessa A. Lau, Allen Cypher, James Lin...