Sciweavers

2541 search results - page 127 / 509
» Ubiquitous computing: by the people, for the people
Sort
View
92
Voted
IBMSJ
2000
108views more  IBMSJ 2000»
14 years 10 months ago
Context-aware design and interaction in computer systems
As human computer interface gets more immersive, it will need to explicitly draw upon cognitive science as a basis for understanding what people are capable of doing. User experie...
Ted Selker, Winslow Burleson
97
Voted
FTDCS
1999
IEEE
15 years 2 months ago
roomComputers-Bridging Spaces
Cooperative Rooms (COR) is an interdisciplinary research and development program of GMD in collaboration with partners. Its objective is to design, develop and investigate future ...
Rolf Reinema, Knut A. Bahr, H.-J. Burkhardt, Marie...
CHI
1998
ACM
15 years 2 months ago
An Efficient Text Input Method for Pen-Based Computers
Pen-based computing has not yet taken off, partly because of the lack of fast and easy text input methods. The situation is even worse for people using East Asian languages, where...
Toshiyuki Masui
COMPSEC
2004
156views more  COMPSEC 2004»
14 years 10 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
PERCOM
2009
ACM
15 years 10 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu