Sciweavers

7596 search results - page 181 / 1520
» Challenges in forensic computing
Sort
View
148
Voted
CHI
2011
ACM
14 years 7 months ago
Proxemic interactions in ubiquitous computing ecologies
An important challenge in ubiquitous computing (ubicomp) is to create techniques that allow people to seamlessly and naturally connect to and interact with the increasing number o...
Nicolai Marquardt
140
Voted
COMPSAC
2011
IEEE
14 years 3 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
CHI
2003
ACM
16 years 4 months ago
Mobile computing in the retail arena
Although PDAs typically run applications in a "standalone" mode, they are increasingly equipped with wireless communications, which makes them useful in new domains. Thi...
Erica Newcomb, Toni Pashley, John T. Stasko
OSDI
2008
ACM
16 years 3 months ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack
137
Voted
ICPR
2010
IEEE
15 years 10 months ago
Hand Pointing Estimation for Human Computer Interaction Based on Two Orthogonal-Views
Hand pointing has been an intuitive gesture for human interaction with computers. Big challenges are still posted for accurate estimation of finger pointing direction in a 3D spac...
Kaoning Hu, Shaun Canavan, Lijun Yin