Sciweavers

3042 search results - page 477 / 609
» Designing for all users: including the odd users
Sort
View
IJDE
2006
95views more  IJDE 2006»
14 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
PUC
2007
117views more  PUC 2007»
14 years 9 months ago
GETA sandals: a footstep location tracking system
Abstract This paper presents the design, implementation, and evaluation of a footstep based indoor location system. The traditional Japanese GETA sandals are equipped with force, u...
Shun-yuan Yeh, Keng-hao Chang, Chon-in Wu, Hao-Hua...
SENSYS
2010
ACM
14 years 8 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
GIS
2010
ACM
14 years 8 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
ICWN
2003
14 years 11 months ago
Eurecom IPv6 Soft Handover
The growing demand for high-speed wireless access to the Internet is the driving force behind the current trends to design All-IP wireless networks, whose Access Router and mobile ...
Farouk Belghoul, Yan Moret, Christian Bonnet