Sciweavers

44 search results - page 9 / 9
» Detecting Possible Manipulators in Elections
Sort
View
ICCV
2007
IEEE
14 years 6 months ago
A Scalable Approach to Activity Recognition based on Object Use
We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where m...
Jianxin Wu, Adebola Osuntogun, Tanzeem Choudhury, ...
ICNP
2007
IEEE
13 years 11 months ago
PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs
— While the 802.11 power saving mode (PSM) and its enhancements can reduce power consumption by putting the wireless network interface (WNI) into sleep as much as possible, they ...
Enhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang
MM
2010
ACM
210views Multimedia» more  MM 2010»
13 years 4 months ago
Increasing interactivity in street view web navigation systems
This paper presents some interactive features we have added on our street-view web navigation application. Our system allows to navigate through a huge amount of data (panoramas a...
Alexandre Devaux, Nicolas Paparoditis
JUCS
2008
147views more  JUCS 2008»
13 years 4 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...