Sciweavers

120 search results - page 18 / 24
» Data Hiding: Current Status and Key Issues
Sort
View
IEEEARES
2007
IEEE
15 years 3 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
JSAC
2008
167views more  JSAC 2008»
14 years 9 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell
AINA
2005
IEEE
15 years 3 months ago
mPATH: An Interactive Visualization Framework for Behavior History
This paper presents an interactive analysis and visualization framework for behavior histories, called mPATH framework. In ubiquitous computing environment, it is possible to infe...
Masaki Ito, Jin Nakazawa, Hideyuki Tokuda
ASSETS
2008
ACM
14 years 11 months ago
A3: a coding guideline for HCI+autism research using video annotation
Due to the profile of strengths and weaknesses indicative of autism spectrum disorders (ASD), technology may play a key role in ameliorating communication difficulties with this p...
Joshua M. Hailpern, Karrie Karahalios, James Halle...
86
Voted
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
14 years 8 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...