13,199 Hits in 6.3 sec

Enlightening a co-located community with a semi-public notification system

Goldie B. Terrell, D. Scott McCrickard
2006 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work - CSCW '06  
The paper reports on the lessons learned about the device's characteristics, and provides anecdotes and observations on ways in which this type of device can improve communication and enhance community  ...  place that enhances it.  ...  We targeted an off-the-desktop system for improving community through a focused but secondary information source and a small, non-monitor-based presentation style, balancing desires for an attractive off-the-desktop  ... 
doi:10.1145/1180875.1180879 dblp:conf/cscw/TerrellM06 fatcat:eqd4l6oixna3zjxptb7hofn6mu

Large Displays for Knowledge Work [chapter]

Elizabeth D. Mynatt, Elaine M. Huang, Stephen Voida, Blair MacIntyre
2003 Public and Situated Displays  
Our research in designing office systems that better support this class of workers has included an in-depth study of traditional whiteboard use and the development of three large display systems, each  ...  We have identified three cross-cutting themes in making these kinds of large display applications effective for supporting a variety of information management activities: context-awareness, privacy and  ...  utility, and stroke cleanup or enhancement.  ... 
doi:10.1007/978-94-017-2813-3_4 fatcat:ixzdn4d5qze7hfl5yeldm4k5ea

[Invited Paper] Issues and Solutions to Informal Communication in Working from Home Using a Telepresence Robot

Emi Myodo, Jianfeng Xu, Kazuyuki Tasaka, Hiromasa Yanagihara, Shigeyuki Sakazawa
2018 ITE Transactions on Media Technology and Applications  
In a telework scenario, the lack of informal communications, such as impromptu meetings, is a hard-to-solve problem for those who work at home over the long term.  ...  One of the unresolved issues is that a stationary or desktop robot has a difficulty in initiating informal communication because it cannot move around the office.  ...  Becht for implementing the systems, S. Komorita, A. Oki, T. Obara, and S. Takayama for their valuable advice and conducting field studies.  ... 
doi:10.3169/mta.6.30 fatcat:elgtjjfvivgsjf32fsmiync2sm

Selected Papers From the 2021 IEEE Symposium on Security and Privacy

Terry Benzel, Thorsten Holz
2022 IEEE Security and Privacy  
His research interests include technical aspects of secure systems, with a specific focus on systems security.  ...  We hope that, by bringing a subset of the 2021 IEEE Symposium on Security and Privacy program to you, this IEEE Security & Privacy special issue will enhance the connection between the conference and magazine  ... 
doi:10.1109/msec.2022.3142463 fatcat:rlgvmlizdvg7vbgu5emswlqndy

COREnect EuCNC workshop - Patrick Pipe

2021 Zenodo  
Resilience-by-Design Resilience-by-Reaction Intelligence… where ML & security meet… Security and ML Security of ML Confidentiality Adversarial examples Integrity & Authenticity Privacy  ...  Current systems do not scale to requirements beyond 2020" (*) (*) Source : From 5G to 6G… Enhanced Mobile Broadband  ... 
doi:10.5281/zenodo.4982666 fatcat:mda3vix3qfgznepfob7sgn3i54

Cloud Computing and Big Data for Oil and Gas Industry Application, China

Yang Zhifeng
2019 Journal of Computers  
Then,cloud desktop for oil and gas industry applications are also introduced in terms of efficiency, security and usability.  ...  Cloud computing and big data architectures have advantages in many aspects, such as system scalability, reliability, and serviceability.  ...  The cloud storage system meets the demand of massive data storage, and solves the bottleneck of large capacity data storage in the relay satellite system [30] .  ... 
doi:10.17706/jcp.14.4.268-282 fatcat:r44blslnbjckdo22qbe37eoo7a


Aaron Gember, Christopher Dragga, Aditya Akella
2012 Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems - ANCS '12  
However, we must address three practical roadblocks to make offloading amenable to adoption by enterprises: (i) ensuring privacy and trustworthiness of offload, (ii) decoupling offloading systems from  ...  This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations.  ...  The challenge lies in optimally and fairly multiplexing offloaded applications amongst these resources to meet the energy, latency and privacy needs of each mobile device.  ... 
doi:10.1145/2396556.2396598 dblp:conf/ancs/GemberDA12 fatcat:4edqkscgmjhnlnnbcybxrhu56a

Of Vampire mirrors and privacy lamps

Andreas Butz, Clifford Beshers, Steven Feiner
1998 Proceedings of the 11th annual ACM symposium on User interface software and technology - UIST '98  
We consider the problem of privacy in a 3D multi-user collaborative environment.  ...  We suggest two methods, which we call vampire mirrors and privacy lamps, that are unobtrusive, simple, and natural.  ...  Introduction Privacy is an important issue in the design of any multi-user system.  ... 
doi:10.1145/288392.288598 dblp:conf/uist/ButzBF98 fatcat:7hgvtuy5jfewzdkzoc4gcqo7ii

SmartWorkplace: A Privacy-based Fog Computing Approach to Boost Energy Efficiency and Wellness in Digital Workspaces

Fatima-Zohra Benhamida, Joan Navarro, Oihane Gómez-Carmona, Diego Casado-Mansilla, Diego López-de-Ipiña, Agustín Zaballos
2019 International Conference on the Internet of Things  
The massive digitalization of modern society has transformed human lifestyles in several dimensions ranging from social interactions to healthcare and wellness, including transportation systems, jobs,  ...  This work presents an architectural approach to improve energy efficiency and wellness at work (by suggesting new behaviours and dynamics) while maintaining user comfort and keeping user's privacy.  ...  , etc.) but it also may reveal private data regarding contents of contracts, meetings, etc.  ... 
dblp:conf/iot/BenhamidaNGCLZ19 fatcat:cdtx4tik7faxvojx5r2pvjeqiy

LocaTag - An NFC-Based System Enhancing Instant Messaging Tools with Real-Time User Location

Felix Köbler, Philip Koene, Helmut Krcmar, Matthias Altmann, Jan Marco Leimeister
2010 2010 Second International Workshop on Near Field Communication  
The paper describes LocaTag, a system that enhances instant messaging tools with real-time location information through the use of NFCenabled mobile devices.  ...  The LocaTag application is implemented as a prototype system that provides the Skype TM instant messaging application with automated status messages, reflecting the current location of a user.  ...  From a technical perspective, the LocaTag prototype system could be enhanced with the use of GPS-receivers embedded within mobile devices.  ... 
doi:10.1109/nfc.2010.20 fatcat:xkgboqd74jbybfe5bjx3jujeku

Sensing activity in video images

Alison Lee, Kevin Schlueter, Andreas Girgensohn
1997 CHI '97 extended abstracts on Human factors in computing systems looking to the future - CHI '97  
from video images and provides options to control privacy and improves the usability of video-based awareness tools.  ...  based awareness tools and iconic indicators because it meets three crucial user requirements.  ...  WHAT: ACTIVITY SENSING In our Portholes system, a video image for each user is snapped once every five minutes. The images for the last hour (12 of them) are kept.  ... 
doi:10.1145/1120212.1120413 dblp:conf/chi/LeeSG97 fatcat:rmoglkrc2rgd3pav7sup533yka

The Design and Evaluation of a Mobile Location-Aware Handheld Event Planner [chapter]

Rachel Fithian, Giovanni Iachello, Jehan Moghazy, Zachary Pousman, John Stasko
2003 Lecture Notes in Computer Science  
systems.  ...  We describe the design and evaluation of an integrated location-aware event and meeting planner built to work in a PDA form factor.  ...  Usability problems of privacy enhancing technology are not new [19] , and this study reiterates the need for a uniform and meaningful iconography and mixed iconographic/textual interfaces.  ... 
doi:10.1007/978-3-540-45233-1_12 fatcat:cq3vv5p3pnh5pkbhgkdzx7dopy


Junius A. Gunaratne, A. J. Bernheim Brush
2010 Proceedings of the 28th international conference on Human factors in computing systems - CHI '10  
We describe Newport's system design and a formative evaluation with 12 participants to study their experience using Newport to share location, receive directions, share photos, and perform desktop sharing  ...  Numerous applications exist to share desktops between people including Adobe Acrobat Connect Pro, Microsoft Live Meeting and several applications built on VNC's open source code.  ...  Those who had done remote desktop sharing in the past on current software found it difficult to set up and in many cases had another person set up the system.  ... 
doi:10.1145/1753326.1753379 dblp:conf/chi/GunaratneB10 fatcat:35zgr7lnw5gsllawmxzyvgs34y

BYOD Security: A New Business Challenge [article]

K. Downer, Maumita Bhattacharya
2016 arXiv   pre-print
There are four types of end user virtualisation: virtual desktop streaming, application streaming, hosted virtual desktop & hosted virtual applications, which divide applications, operating systems and  ...  Limited explanation about how to enhance access control solutions. I Disterer et al, 2013 Opportunities and risks of BYO and comparison of desktop virtualisation models.  ... 
arXiv:1601.01230v1 fatcat:babvftxowne7ll44nfleknz4ke

When ABE Meets RSS [chapter]

Yu Chen, Hyun Sung Kim, Jianbin Hu, Zhong Chen
2010 Lecture Notes in Computer Science  
However, the current RSS standard does not provide privacy preservation and confidentiality protection.  ...  We propose ABE-RSS, an security enhanced version of RSS, in which ABE is used to secure RSS feeds. Experimental results demonstrate that ABE-RSS is efficient and feasible.  ...  In order to meet the privacy and security demands as well as maintaining the convenience and openness of RSS, we expect RSS admits: 1.  ... 
doi:10.1007/978-3-642-13739-6_23 fatcat:2qdhnaoyx5fzlnei5dgjcmp54y
« Previous Showing results 1 — 15 out of 13,199 results