Sciweavers

561 search results - page 23 / 113
» How to operate a PC without using the hands
Sort
View
95
Voted
DIM
2005
ACM
15 years 1 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
94
Voted
ROCAI
2004
Springer
15 years 5 months ago
ROC Optimisation of Safety Related Systems
Abstract. Many safety related and critical systems warn of potentially dangerous events; for example the Short Term Conflict Alert (STCA) system warns of airspace infractions betw...
Jonathan E. Fieldsend, Richard M. Everson
HICSS
2003
IEEE
107views Biometrics» more  HICSS 2003»
15 years 5 months ago
The Customer-Centric Data Warehouse - An Architectural Approach to Meet the Challenges of Customer Orientation
This paper presents research-in-progress. An extensive customer-centric data warehouse architecture should enable both complex analytical queries as well as standard reporting que...
Hans-Georg Kemper, Phil-Lip Lee
CORR
2011
Springer
217views Education» more  CORR 2011»
14 years 3 months ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins
CVPR
2004
IEEE
16 years 1 months ago
Programmable Imaging Using a Digital Micromirror Array
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric a...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult