Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2005
DOI: 10.1145/1054972.1055008
|View full text |Cite
|
Sign up to set email alerts
|

tranSticks

Abstract: A virtually connected medium called tranStick is described that functions both as a "virtual wire" and as a "memory card" containing a shared space. A user can connect two networked devices by simply placing one of a pair of tranSticks with the same identifier into each device. The tranSticks provide feedback indicating that the devices are connected; the connection to be closed or changed in the same way it would be if the devices were connected by a physical cable. A user can also access to a shared space on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…This metaphor can be applied to wireless device association, where the same user action is preserved, but instead the cable is replaced by a virtual wireless connection. Ayatsuka and Rekimoto [2005] presented "tranStick," a technique that illustrates this concept. In their system, tangible tokens are used for establishing connections.…”
Section: Physical Extensionmentioning
confidence: 99%
See 3 more Smart Citations
“…This metaphor can be applied to wireless device association, where the same user action is preserved, but instead the cable is replaced by a virtual wireless connection. Ayatsuka and Rekimoto [2005] presented "tranStick," a technique that illustrates this concept. In their system, tangible tokens are used for establishing connections.…”
Section: Physical Extensionmentioning
confidence: 99%
“…A widely deployed mechanism is Bluetooth pairing, which involves selection of a target device from a list of available devices (with an additional PIN authentication procedure, if security is required). However, researchers have demonstrated a great many alternative approaches, some focused on simplicity of the required user action [Hinckley 2003;Holmquist et al 2001;Rekimoto et al 2003b], and others on interactive authentication (addressing the problem that connections cannot be easily verified in the absence of wires [Balfanz et al 2002;Kindberg and Zhang 2003b;Stajano and Anderson 1999]). …”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The spatial proximity of the two devices is sensed via infrared or radio frequency identification (RFID) technology [8] . Additional devices, such as Universal Serial Bus (USB) memory sticks may also be used for authentication [16] .…”
Section: Related Work On Device Connectionmentioning
confidence: 99%