Sciweavers

5446 search results - page 911 / 1090
» Mobile computing
Sort
View
MHCI
2009
Springer
15 years 9 months ago
Studying multi-user settings for pervasive games
Whenever a pervasive game has to be developed for a group of children an appropriate multi-user setting has to be found. If the pervasive game does not support the children with a...
Karin Leichtenstern, Elisabeth André
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 9 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
IROS
2007
IEEE
193views Robotics» more  IROS 2007»
15 years 9 months ago
Data acquisition and view planning for 3-D modeling tasks
— In this paper we address the joint problems of automated data acquisition and view planning for large–scale indoor and outdoor sites. Our method proceeds in two distinct stag...
Paul Blaer, Peter K. Allen
COORDINATION
2005
Springer
15 years 8 months ago
A Correct Abstract Machine for Safe Ambients
t Abstract Machine for Safe Ambients Daniel Hirschkoff1 , Damien Pous1 , and Davide Sangiorgi2 1 ENS Lyon, France 2 Universit`a di Bologna, Italy Abstract. We describe an abstract...
Daniel Hirschkoff, Damien Pous, Davide Sangiorgi
IDTRUST
2010
ACM
15 years 1 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala