Sciweavers

5344 search results - page 952 / 1069
» Privacy-Preserving Set Operations
Sort
View
CHI
2008
ACM
16 years 3 months ago
Targeting across displayless space
Multi-monitor displays and multi-display environments are now common. Cross-display cursor movement, in which a user moves the pointer from one display to another, occurs frequent...
Miguel A. Nacenta, Regan L. Mandryk, Carl Gutwin
CHI
2008
ACM
16 years 3 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
VLSID
2008
IEEE
166views VLSI» more  VLSID 2008»
16 years 3 months ago
Exploring the Processor and ISA Design for Wireless Sensor Network Applications
Power consumption, physical size, and architecture design of sensor node processors have been the focus of sensor network research in the architecture community. What lies at the ...
Shashidhar Mysore, Banit Agrawal, Frederic T. Chon...
169
Voted
CHI
2003
ACM
16 years 3 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
POPL
2008
ACM
16 years 3 months ago
Systems biology, models, and concurrency
Models will play a central role in the representation, storage, manipulation, and communication of knowledge in systems biology. Models capable of fulfilling such a role will like...
Walter Fontana