Sciweavers

1573 search results - page 237 / 315
» Strong User Authentication
Sort
View
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 2 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
INFOCOM
2002
IEEE
15 years 2 months ago
Joint Scheduling and Power Control for Wireless Ad-hoc Networks
—In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks. The motivation for this study is twofold,...
Tamer A. ElBatt, Anthony Ephremides
CHI
2000
ACM
15 years 2 months ago
Does computer-generated speech manifest personality? an experimental test of similarity-attraction
This study examines whether people would interpret and respond to paralinguistic personality cues in computergenerated speech in the same way as they do human speech. Participants...
Clifford Nass, Kwan Min Lee
SIGMETRICS
1999
ACM
137views Hardware» more  SIGMETRICS 1999»
15 years 2 months ago
A Large-Scale Study of File-System Contents
We collect and analyze a snapshot of data from 10,568 file systems of 4801 Windows personal computers in a commercial environment. The file systems contain 140 million files total...
John R. Douceur, William J. Bolosky
COBUILD
1999
Springer
15 years 2 months ago
Matching Information and Ambient Media
Ambient media have recently been introduced as a means to present information in our surrounding space in subtle and unmonopolizing ways, promoting peripheral awareness. This paper...
Albrecht Schmidt, Hans-Werner Gellersen, Michael B...