Sciweavers

1384 search results - page 115 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
15 years 1 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
CHI
2006
ACM
15 years 10 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas
CHI
2002
ACM
15 years 10 months ago
Creating principal 3D curves with digital tape drawing
Previous systems have explored the challenges of designing an interface for automotive styling which combine the metaphor of 2D drawing using physical tape with the simultaneous c...
Tovi Grossman, Ravin Balakrishnan, Gordon Kurtenba...
CHI
2007
ACM
15 years 10 months ago
Endpoint prediction using motion kinematics
Recently proposed novel interaction techniques such as cursor jumping [1] and target expansion for tiled arrangements [13] are predicated on an ability to effectively estimate the...
Edward Lank, Yi-Chun Nikko Cheng, Jaime Ruiz
CHI
2002
ACM
15 years 10 months ago
Acquisition of expanding targets
There exist several user interface widgets that dynamically grow in size in response to the user's focus of attention. Some of these, such as icons in toolbars, expand to fac...
Michael J. McGuffin, Ravin Balakrishnan