Sciweavers

59 search results - page 5 / 12
» Message Classification in the Call Center
Sort
View
ASSETS
2009
ACM
14 years 7 months ago
Fall and emergency detection with mobile phones
In this demo, we present an application for mobile phones which can monitor physical activities of users and detect unexpected emergency situations such as a sudden fall or accide...
Hamed Ketabdar, Tim Polzehl
ACMDIS
2010
ACM
14 years 9 months ago
A tale of two publics: democratizing design at the margins
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins ...
Christopher A. Le Dantec, Jim Christensen, Mark Ba...
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
15 years 1 months ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
110
Voted
INFOCOM
1998
IEEE
15 years 1 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
IJBC
2008
63views more  IJBC 2008»
14 years 9 months ago
On Isoconcentration Surfaces of Three-Dimensional Turing Patterns
We consider three dimensional Turing patterns and their isoconcentration surfaces corresponding to the equilibrium concentration of the reaction kinetics. We call these surfaces eq...
Tilmann Glimm, H. George E. Hentschel