Sciweavers

13895 search results - page 2426 / 2779
» Exploring
Sort
View
135
Voted
SEMCO
2008
IEEE
15 years 11 months ago
Using Similarity Measures for Context-Aware User Interfaces
Context-aware user interfaces facilitate the user interaction by suggesting or prefilling data derived from the user’s current context. This raises the problem of mapping conte...
Melanie Hartmann, Torsten Zesch, Max Mühlh&au...
123
Voted
TABLETOP
2008
IEEE
15 years 11 months ago
On top of tabletop: A virtual touch panel display
In the real world, a physical tabletop provides public and private needs for people around the table. For competing scenarios such as playing a poker game or running a price negot...
Li-Wei Chan, Ting-Ting Hu, Jin-Yao Lin, Yi-Ping Hu...
WIMOB
2008
IEEE
15 years 11 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
194
Voted
ABIALS
2008
Springer
15 years 11 months ago
The Cognitive Body: From Dynamic Modulation to Anticipation
Abstract— Starting from the situated and embodied perspective on the study of biological cognition as a source of inspiration, this paper programmatically outlines a path towards...
Alberto Montebelli, Robert Lowe, Tom Ziemke
153
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
« Prev « First page 2426 / 2779 Last » Next »