Sciweavers

4529 search results - page 828 / 906
» Position Based Cryptography
Sort
View
87
Voted
CHI
2008
ACM
16 years 1 months ago
Blindsight: eyes-free access to mobile phones
Many mobile phones integrate services such as personal calendars. Given the social nature of the stored data, however, users often need to access such information as part of a pho...
Kevin A. Li, Patrick Baudisch, Ken Hinckley
106
Voted
CHI
2007
ACM
16 years 1 months ago
A cognitive constraint model of dual-task trade-offs in a highly dynamic driving task
The paper describes an approach to modeling the strategic variations in performing secondary tasks while driving. In contrast to previous efforts that are based on simulation of a...
Duncan P. Brumby, Andrew Howes, Dario D. Salvucci
116
Voted
CHI
2005
ACM
16 years 1 months ago
Smart sinks: real-world opportunities for context-aware interaction
Can implicit interaction with a computer easily drive useful interface improvements in physical world settings? This paper presents a case study presenting multiple such context-a...
Leonardo Bonanni, Ernesto Arroyo, Chia-Hsun Lee, T...
143
Voted
VLSID
2002
IEEE
207views VLSI» more  VLSID 2002»
16 years 1 months ago
Synthesis of High Performance Low Power Dynamic CMOS Circuits
This paper presents a novel approach for the synthesis of dynamic CMOS circuits using Domino and Nora styles. As these logic styles can implement only non-inverting logic, convent...
Debasis Samanta, Nishant Sinha, Ajit Pal
101
Voted
CHI
2004
ACM
16 years 1 months ago
Measuring presence in virtual environments
The effectiveness of virtual environments (VEs) has often been linked to the sense of presence reported by users of those VEs. (Presence is defined as the subjective experience of...
Rod McCall, Shaleph O'Neill, Fiona Carroll