Sciweavers

14 search results - page 3 / 3
» Behavior-Based Mobile Manipulation Inspired by the Human Exa...
Sort
View
CHI
2006
ACM
14 years 5 months ago
Sashay: designing for wonderment
No longer confined to our offices, schools, and homes, technology is expanding at an astonishing rate across our everyday public urban landscapes. From the visible (mobile phones,...
Eric Paulos, Chris Beckmann
ISSA
2004
13 years 6 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
SIGKDD
2010
259views more  SIGKDD 2010»
13 years 7 hour ago
Activity recognition using cell phone accelerometers
Mobile devices are becoming increasingly sophisticated and the latest generation of smart cell phones now incorporates many diverse and powerful sensors. These sensors include GPS...
Jennifer R. Kwapisz, Gary M. Weiss, Samuel Moore
CHI
2003
ACM
14 years 5 months ago
Phrase sets for evaluating text entry techniques
In evaluations of text entry methods, participants enter phrases of text using a technique of interest while performance data are collected. This paper describes and publishes (vi...
I. Scott MacKenzie, R. William Soukoreff