Sciweavers

542 search results - page 97 / 109
» Mobility in Collaboration
Sort
View
91
Voted
WIMOB
2008
IEEE
15 years 6 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
HUC
2007
Springer
15 years 6 months ago
Why It's Worth the Hassle: The Value of In-Situ Studies When Designing Ubicomp
How should Ubicomp technologies be evaluated? While lab studies are good at sensing aspects of human behavior and revealing usability problems, they are poor at capturing context o...
Yvonne Rogers, Kay Connelly, Lenore Tedesco, Willi...
105
Voted
CSCW
2006
ACM
15 years 6 months ago
Context-aware telephony: privacy preferences and sharing patterns
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with cont...
Ashraf Khalil, Kay Connelly
104
Voted
PERVASIVE
2005
Springer
15 years 5 months ago
Towards Massively Multi-user Augmented Reality on Handheld Devices
Augmented Reality (AR) can naturally complement mobile computing on wearable devices by providing an intuitive interface to a three-dimensional information space embedded within ph...
Daniel Wagner, Thomas Pintaric, Florian Ledermann,...
MM
2004
ACM
157views Multimedia» more  MM 2004»
15 years 5 months ago
Everyday cinema
Stories make our experiences memorable over time. In constructing and sharing our personal and communal memories, we move in a reflective manner back and forth between our lifewor...
Aisling Kelliher