Sciweavers

6239 search results - page 1072 / 1248
» From Zinc to Design Model
Sort
View
127
Voted
SASN
2005
ACM
15 years 6 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
SI3D
2005
ACM
15 years 6 months ago
A camera-based interface for interaction with mobile handheld computers
Recent advances in mobile computing allow the users to deal with 3D interactive graphics on handheld computers. Although the computing resources and screen resolutions grow steadi...
Martin Hachet, Joachim Pouderoux, Pascal Guitton
117
Voted
SIGIR
2005
ACM
15 years 6 months ago
Personalizing search via automated analysis of interests and activities
We formulate and study search algorithms that consider a user’s prior interactions with a wide variety of content to personalize that user’s current Web search. Rather than re...
Jaime Teevan, Susan T. Dumais, Eric Horvitz
CEAS
2005
Springer
15 years 6 months ago
Implicit Queries for Email
Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query resea...
Joshua Goodman, Vitor R. Carvalho
94
Voted
DRM
2005
Springer
15 years 6 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
« Prev « First page 1072 / 1248 Last » Next »