Sciweavers

3299 search results - page 535 / 660
» Privacy and Trusted Computing
Sort
View
CHI
1998
ACM
15 years 8 months ago
Designing Audio Aura
In this paper, we describe the process behind the design of Audio Aura. The goal of Audio Aura is to provide serendipitous information, via background auditory cues, that is tied ...
Elizabeth D. Mynatt, Maribeth Back, Roy Want, Mich...
CHI
1998
ACM
15 years 8 months ago
Awareness Driven Video Quality of Service in Collaborative Virtual Environments
We extend previous work on texture mapping video streams into virtual environments by introducing awareness driven video QoS. This uses movements within a shared virtual world to ...
Gail Reynard, Steve Benford, Chris Greenhalgh, Chr...
CHI
1992
ACM
15 years 8 months ago
Realizing a Video Environment: EuroPARC's RAVE System
At EuroPARC, we have been exploring ways to allow physically separatedcolleagues to work together effectively and naturally. In this paper, we briefly discuss several examples of ...
William W. Gaver, Thomas P. Moran, Allan MacLean, ...
135
Voted
AINA
2005
IEEE
15 years 6 months ago
Estimations on the Security Aspect of Brand's Electronic Cash Scheme
In Crypto’93, Stefan Brands [1] proposed a very efficient off-line electronic cash. Then, the subsequent researchers such as Ernest Foo [2,3], WK Yip [4] and Yiannis [5] develop...
Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman
140
Voted
DAIS
2007
15 years 5 months ago
The Context-Dependent Role Model
Implementing context-dependent behaviour of pervasive computing applications puts a great burden on programmers: Devices need to continuously adapt not only to their own context, b...
Jorge Vallejos, Peter Ebraert, Brecht Desmet, Tom ...