Sciweavers

24529 search results - page 4723 / 4906
» Computing on Authenticated Data
Sort
View
141
Voted
CHI
2011
ACM
14 years 7 months ago
TapBack: towards richer mobile interfaces in impoverished contexts
Much of the mobile work by HCI researchers explores a future world populated by high-end devices and relatively affluent users. This paper turns to consider the hundreds of milli...
Simon Robinson, Nitendra Rajput, Matt Jones, Anupa...
161
Voted
CHI
2011
ACM
14 years 7 months ago
Am I wasting my time organizing email?: a study of email refinding
We all spend time every day looking for information in our email, yet we know little about this refinding process. Some users expend considerable preparatory effort creating compl...
Steve Whittaker, Tara Matthews, Julian A. Cerruti,...
154
Voted
CHI
2011
ACM
14 years 7 months ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
157
Voted
ICALP
2011
Springer
14 years 7 months ago
On Tree-Constrained Matchings and Generalizations
We consider the following Tree-Constrained Bipartite Matching problem: Given two rooted trees T1 = (V1, E1), T2 = (V2, E2) and a weight function w : V1 × V2 → R+, find a maximu...
Stefan Canzar, Khaled M. Elbassioni, Gunnar W. Kla...
233
Voted
IPSN
2011
Springer
14 years 7 months ago
Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a ke...
Matteo Ceriotti, Michele Corrà, Leandro D'O...
« Prev « First page 4723 / 4906 Last » Next »