Sciweavers

24529 search results - page 4602 / 4906
» Computing on Authenticated Data
Sort
View
MOBISYS
2009
ACM
16 years 5 months ago
EnTracked: energy-efficient robust position tracking for mobile devices
An important feature of a modern mobile device is that it can position itself. Not only for use on the device but also for remote applications that require tracking of the device....
Mikkel Baun Kjærgaard, Jakob Langdal, Torben...
MOBISYS
2009
ACM
16 years 5 months ago
BlueMonarch: a system for evaluating bluetooth applications in the wild
Despite Bluetooth's popularity, low cost, and low power requirements, Bluetooth applications remain remarkably unsophisticated. Although the research community and industry h...
Timothy J. Smith, Stefan Saroiu, Alec Wolman
CHI
2008
ACM
16 years 4 months ago
Investigating statistical machine learning as a tool for software development
As statistical machine learning algorithms and techniques continue to mature, many researchers and developers see statistical machine learning not only as a topic of expert study,...
Kayur Patel, James Fogarty, James A. Landay, Bever...
CHI
2008
ACM
16 years 4 months ago
Blindsight: eyes-free access to mobile phones
Many mobile phones integrate services such as personal calendars. Given the social nature of the stored data, however, users often need to access such information as part of a pho...
Kevin A. Li, Patrick Baudisch, Ken Hinckley
CHI
2007
ACM
16 years 4 months ago
Meta-analysis of correlations among usability measures
Understanding the relation between usability measures seems crucial to deepen our conception of usability and to select the right measures for usability studies. We present a meta...
Kasper Hornbæk, Effie Lai-Chong Law
« Prev « First page 4602 / 4906 Last » Next »