Sciweavers

1152 search results - page 157 / 231
» mobility 2009
Sort
View
188
Voted
CP
2009
Springer
16 years 1 months ago
A Constraint on the Number of Distinct Vectors with Application to Localization
Abstract. This paper introduces a generalization of the nvalue constraint that bounds the number of distinct values taken by a set of variables.The generalized constraint (called n...
Gilles Chabert, Luc Jaulin, Xavier Lorca
80
Voted
CHI
2009
ACM
16 years 1 months ago
Codex: a dual screen tablet computer
The Codex is a dual-screen tablet computer, about the size of a 4"x6" day planner, with a self-supporting binding and embedded sensors. The device can be oriented in a v...
François Guimbretière, Ken Hinckley,...
82
Voted
CHI
2009
ACM
16 years 1 months ago
On being supple: in search of rigor without rigidity in meeting new design and evaluation challenges for HCI practitioners
In this paper, we argue that HCI practitioners are facing new challenges in design and evaluation that can benefit from the establishment of commonly valued use qualities, with as...
Katherine Isbister, Kristina Höök
87
Voted
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 1 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
16 years 1 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...