Share This Author
Home automation in the wild: challenges and opportunities
The long term experience of households with home automation illustrates four barriers that need to be addressed before home automation becomes amenable to broader adoption, and provides several directions for further research.
PreHeat: controlling home heating using occupancy prediction
In UK homes PreHeat both saved gas and reduced MissTime (the time that the house was occupied but not warm) while removing the need for users to program thermostat schedules.
An Operating System for the Home
HomeOS is a platform that bridges this gap by presenting users and developers with a PC-like abstraction for technology in the home by presenting network devices as peripherals with abstract interfaces, enables cross-device tasks via applications written against these interfaces, and gives users a management interface designed for the home environment.
Exploring the relationship between personal and public annotations
A study to characterize and compare students' personal annotations as they read assigned papers with those they shared with each other using an online system confirmed three hypotheses: only a small fraction of annotations made while reading are directly related to those shared in discussion, and some types of annotations are more apt to be the basis of public commentary than other types.
Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments
The diverse ways families chose to share their computers suggest that future devices might better match how families wish to use shared technology by supporting both the shared usage model of appliances and the ability to access a personal profile.
SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones
SpeakerSense is built, a speaker identification prototype that uses a heterogeneous multi-processor hardware architecture that splits computation between a low power processor and the phone's application processor to enable continuous background sensing with minimal power requirements.
It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions
- Stuart E. Schechter, A. Brush, Serge Egelman
- Computer Science30th IEEE Symposium on Security and Privacy
- 15 July 2009
A user study ran to measure the reliability and security of the questions used by all four webmail providers, finding that 13% of answers could be guessed within five attempts by guessing the most popular answers of other participants, though this weakness is partially attributable to the geographic homogeneity of the participant pool.
Exploring communication and sharing between extended families
Can i borrow your phone?: understanding concerns when sharing mobile phones
The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today's binary model.
Reading Revisited: Evaluating the Usability of Digital Display Surfaces for Active Reading Tasks
- M. Morris, A. Brush, B. Meyers
- Computer ScienceSecond Annual IEEE International Workshop on…
- 19 November 2007
This work revisits the issue of reading in the workplace, comparing paper use to state-of-the-art hardware and software, and proposes design guidelines for hybrid horizontal + vertical systems that support active reading tasks.