Sciweavers

7422 search results - page 1299 / 1485
» Ethnomethodologically informed ethnography and information s...
Sort
View
AINA
2009
IEEE
15 years 8 months ago
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
DCC
2009
IEEE
15 years 8 months ago
Tree Histogram Coding for Mobile Image Matching
For mobile image matching applications, a mobile device captures a query image, extracts descriptive features, and transmits these features wirelessly to a server. The server reco...
David M. Chen, Sam S. Tsai, Vijay Chandrasekhar, G...
HICSS
2009
IEEE
74views Biometrics» more  HICSS 2009»
15 years 8 months ago
Unleashing Mobility in the Organization: A Time-Geography Perspective
The increased fluidity and agility of organizations demand the smooth mediation of information technology (IT) between user and task. As rigid hierarchies are giving way to open, ...
Douglas M. Schutz, Yong-Young Kim, Youngjin Yoo
AOSD
2009
ACM
15 years 8 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
CSE
2009
IEEE
15 years 8 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
« Prev « First page 1299 / 1485 Last » Next »