Sciweavers

8655 search results - page 1523 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2010
ACM
15 years 5 months ago
LensMouse: augmenting the mouse with an interactive touch display
We introduce LensMouse, a novel device that embeds a touch-screen display – or tangible ‘lens’ – onto a mouse. Users interact with the display of the mouse using direct to...
Xing-Dong Yang, Edward Mak, David C. McCallum, Pou...
CHI
2010
ACM
15 years 5 months ago
Mobile-izing health workers in rural India
Researchers have long been interested in the potential of ICTs to enable positive change in developing regions communities. In these environments, ICT interventions often fail bec...
Divya Ramachandran, John Canny, Prabhu Dutta Das, ...
CHI
2010
ACM
15 years 5 months ago
Let's play chinese characters: mobile learning approaches via culturally inspired group games
In many developing countries such as India and China, low educational levels often hinder economic empowerment. In this paper, we argue that mobile learning games can play an impo...
Feng Tian, Fei Lv, Jingtao Wang, Hongan Wang, Wenc...
SAC
2010
ACM
15 years 5 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
SAC
2010
ACM
15 years 5 months ago
Adaptive internet services through performance and availability control
Cluster-based multi-tier systems provide a means for building scalable Internet services. Building adaptive Internet services that are able to apply appropriate system sizing and ...
Jean Arnaud, Sara Bouchenak
« Prev « First page 1523 / 1731 Last » Next »