Sciweavers

1513 search results - page 174 / 303
» Evaluation of User-Interfaces for Mobile Application Develop...
Sort
View
ECAI
2008
Springer
14 years 11 months ago
Learning to Select Object Recognition Methods for Autonomous Mobile Robots
Selecting which algorithms should be used by a mobile robot computer vision system is a decision that is usually made a priori by the system developer, based on past experience and...
Reinaldo A. C. Bianchi, Arnau Ramisa, Ramon L&oacu...
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
15 years 3 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
CHI
2006
ACM
15 years 10 months ago
Attention funnel: omnidirectional 3D cursor for mobile augmented reality platforms
The attention funnel is a general purpose AR interface technique that interactively guides the attention of a user to any object, person, or place in space. The technique utilizes...
Frank Biocca, Arthur Tang, Charles B. Owen, Fan Xi...
KBSE
2008
IEEE
15 years 4 months ago
Exploiting social software to build open source communities
This paper describes work in progress on how to build open source communities. The proposed approach is based on exploiting existing social software communities and applications t...
Imed Hammouda, Timo Aaltonen, Petri Sirkkala
JIPS
2007
223views more  JIPS 2007»
14 years 10 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson