Sciweavers

2399 search results - page 114 / 480
» On Authentication between Human and Computer
Sort
View
EXPERT
2006
156views more  EXPERT 2006»
15 years 4 months ago
Computational Models of Ethical Reasoning: Challenges, Initial Steps, and Future Directions
on abstract principles that you can't easily apply in a formal, deductive fashion. So, the favorite tools of logicians and mathematicians, such as firstorder logic, aren'...
Bruce M. McLaren
CHI
2008
ACM
16 years 4 months ago
Impromptu: a new interaction framework for supporting collaboration in multiple display environments and its field evaluation fo
We present a new interaction framework for collaborating in multiple display environments (MDEs) and report results from a field study investigating its use in an authentic work s...
Jacob T. Biehl, William T. Baker, Brian P. Bailey,...
CHI
2008
ACM
16 years 4 months ago
The associative pda 2.0
In this paper I describe the Associative PDA 2.0, a mobile system for Personal Information Management (PIM), based on an associative information network. In addition to associate ...
Eileen Falke
124
Voted
CHI
2005
ACM
16 years 4 months ago
Roomquake: embedding dynamic phenomena within the physical space of an elementary school classroom
Authentic practice in science requires access to phenomena. In this paper, we introduce RoomQuake, an application designed to foster the growth of a community of learning around s...
Tom Moher, Syeda Hussain, Tim Halter, Debi Kilb
SOUPS
2009
ACM
15 years 10 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe