Sciweavers

2262 search results - page 351 / 453
» Developing adaptable user interfaces for component-based sys...
Sort
View
MHCI
2005
Springer
15 years 8 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...
CVPR
2010
IEEE
15 years 11 months ago
iCoseg: Interactive Co-segmentation with Intelligent Scribble Guidance
We present an algorithm for Interactive Cosegmentation of a foreground object from a group of related images. While previous approaches focus on unsupervised co-segmentation, we us...
Dhruv Batra, Adarsh Kowdle, Devi Parikh, Jiebo Luo...
LCN
2007
IEEE
15 years 9 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
ISWC
2003
IEEE
15 years 8 months ago
Coarse, Inexpensive, Infrared Tracking for Wearable Computing
We present a novel, inexpensive, coarse tracking system that determines a person’s approximate 2D location and 1D head orientation in an indoor environment. While this coarse tr...
Drexel Hallaway, Tobias Höllerer, Steven Fein...
CSFW
2004
IEEE
15 years 7 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann