Sciweavers

3471 search results - page 97 / 695
» User activity histories
Sort
View
GLOBECOM
2006
IEEE
15 years 6 months ago
Rateless Codes for the Gaussian Multiple Access Channel
Abstract— We consider communication over the Gaussian multiple access channel (MAC) with unknown set of active users. The proposed multiple access strategy is distributed and ach...
Urs Niesen, Uri Erez, Devavrat Shah, Gregory W. Wo...
IJNSEC
2006
122views more  IJNSEC 2006»
14 years 12 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
CHI
2002
ACM
16 years 6 days ago
Staying in the flow with zoomable user interfaces
This research aims to investigate a collection of interactions in 2D workspaces with the goal of helping users stay in the flow of their activity. These interactions will be explo...
Lance Good
ICWSM
2010
15 years 1 months ago
User Acceptance of Micro-Blogging in the Enterprise
In this paper, following the IT acceptance theory framework, we analyze factors that affect users' acceptance of micro-blogging in a large corporate environment. We categoriz...
Jun Zhang, Yan Qu, Derek Hansen
INTERACT
2003
15 years 1 months ago
User Centred Design through the Keyhole: Video Design Case
: This paper develops a design case format capable of engaging design practitioners and design students in reflective dialog about their user centred design practice. The core idea...
Ole Sejer Iversen, Jacob Buur