Sciweavers

694 search results - page 10 / 139
» Overcoming Challenges of Maturity
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
83
Voted
MOBICOM
2005
ACM
15 years 5 months ago
Challenges: communication through silence in wireless sensor networks
Wireless sensor networks (WSNs) are typically characterized by a limited energy supply at sensor nodes. Hence, energy efficiency is an important issue in the system design and op...
Yujie Zhu, Raghupathy Sivakumar
SPATIALCOGNITION
2010
Springer
14 years 10 months ago
Verbally Annotated Tactile Maps - Challenges and Approaches
Survey knowledge of spatial environments can be successfully conveyed by visual maps. For visually impaired people, tactile maps have been proposed as a substitute. The latter are ...
Christian Graf
PET
2012
Springer
13 years 2 months ago
Evading Censorship with Browser-Based Proxies
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxi...
David Fifield, Nate Hardison, Jonathan Ellithorpe,...
68
Voted
CHI
2009
ACM
16 years 9 days ago
Reduced empathizing skills increase challenges for user-centered design
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
William Hudson