Sciweavers

2533 search results - page 174 / 507
» Supporting Generalized Context Interactions
Sort
View
104
Voted
CHI
2002
ACM
16 years 5 months ago
The philosophy and design of socially adept technologies
Context-aware artifacts can be seen as an important class of socially adept technologies. In this paper, we focus on the fact that disregarding trivial notions of context, context...
Stephen Marsh, Lucy T. Nowell, John F. Meech, Kers...
ACHI
2008
IEEE
15 years 11 months ago
Face Authentication for Banking
—This paper analyzes the benefit and the limitations of using a particular biometric technology “namely face authentication” for banking applications. We present first the ge...
Baptiste Hemery, Julien Mahier, Marc Pasquet, Chri...
SIGGRAPH
1997
ACM
15 years 9 months ago
Interactive simulation of fire in virtual building environments
This paper describes the integration of the Berkeley Architectural Walkthrough Program with the National Institute of Standards and Technology’s CFAST fire simulator. The integ...
Richard W. Bukowski, Carlo H. Séquin
144
Voted
IJMMS
2008
60views more  IJMMS 2008»
15 years 5 months ago
In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions
Online offences are generally considered as frequent and intentional acts performed by a member with the aim to deceive others. However, an offence may also be unintentional or ex...
Asimina Vasalou, Astrid Hopfensitz, Jeremy V. Pitt
MOBISYS
2009
ACM
16 years 5 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...