Sciweavers

5446 search results - page 919 / 1090
» Mobile computing
Sort
View
207
Voted
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 3 months ago
PicShark: mitigating metadata scarcity through large-scale P2P collaboration
With the commoditization of digital devices, personal information and media sharing is becoming a key application on the pervasive Web. In such a context, data annotation rather th...
Philippe Cudré-Mauroux, Adriana Budura, Manfred H...
NIPS
2003
15 years 4 months ago
Distributed Optimization in Adaptive Networks
We develop a protocol for optimizing dynamic behavior of a network of simple electronic components, such as a sensor network, an ad hoc network of mobile devices, or a network of ...
Ciamac Cyrus Moallemi, Benjamin Van Roy
118
Voted
JCP
2006
120views more  JCP 2006»
15 years 3 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
109
Voted
CHI
2011
ACM
14 years 6 months ago
MoBoogie: creative expression through whole body musical interaction
In this paper we describe MoBoogie, an application that allows users to manipulate and arrange music through movement. MoBoogie is designed to foster experiences in creative expre...
Megan K. Halpern, Jakob Tholander, Max Evjen, Stua...
PET
2007
Springer
15 years 9 months ago
Identity Trail: Covert Surveillance Using DNS
Abstract. The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return th...
Saikat Guha, Paul Francis