Sciweavers

1482 search results - page 241 / 297
» Mobile and embedded databases
Sort
View
WINET
2002
169views more  WINET 2002»
14 years 9 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
ACMIDC
2011
14 years 1 months ago
Pop goes the cell phone: asynchronous messaging for preschoolers
This paper outlines a series of experiments to develop asynchronous messaging systems for preschool aged children. Three unique systems build on a foundational design called Toast...
Hayes Raffle, Rafael Ballagas, Glenda Revelle, Koi...
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
13 years 9 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
CVPR
2006
IEEE
15 years 11 months ago
3D Facial Expression Recognition Based on Primitive Surface Feature Distribution
The creation of facial range models by 3D imaging systems has led to extensive work on 3D face recognition [19]. However, little work has been done to study the usefulness of such...
Jun Wang, Lijun Yin, Xiaozhou Wei, Yi Sun
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
15 years 11 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu