Sciweavers

2564 search results - page 212 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
151
Voted
MHCI
2004
Springer
15 years 8 months ago
Mobile Context Aware Systems: The Intelligence to Support Tasks and Effectively Utilise Resources
: The complex usage of mobile devices coupled with their limited resources in terms of display and processing suggests that being able to understand the context of the user would b...
Russell Beale, Peter Lonsdale
122
Voted
ICIAP
2005
ACM
16 years 3 months ago
Interactive, Mobile, Distributed Pattern Recognition
As the accuracy of conventional classifiers, based only on a static partitioning of feature space, appears to be approaching a limit, it may be useful to consider alternative appro...
George Nagy
101
Voted
CHI
2003
ACM
16 years 3 months ago
MiTAP for real users, real data, real problems
The MiTAP system was developed as an experimental prototype using human language technologies for monitoring disease outbreaks. The system provides timely, multi-lingual, global i...
Laurie E. Damianos, Steve Wohlever, Robyn Kozierok...
HCI
2009
15 years 1 months ago
UbiGesture: Customizing and Profiling Hand Gestures in Ubiquitous Environment
Abstract. One of the main challenges of interaction in a ubiquitous environment is the use of hand gestures for interacting with day to day applications. This interaction may be ne...
Ayman Atia, Shin Takahashi, Kazuo Misue, Jiro Tana...
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao