Sciweavers

448 search results - page 50 / 90
» Personal Workflow Management in Support of Pervasive Computi...
Sort
View
TEI
2010
ACM
257views Hardware» more  TEI 2010»
15 years 7 months ago
Traditional games meet ICT: a case study on go game augmentation
While pervasive technologies explore new gaming styles, traditional games, such as cards and tabletop games are still appealing and have various irreplaceable flavors. We point ou...
Takahiro Iwata, Tetsuo Yamabe, Mikko Polojärv...
CHI
2000
ACM
15 years 4 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...
132
Voted
PERCOM
2011
ACM
14 years 7 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
SOUPS
2010
ACM
15 years 4 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
COMPUTE
2010
ACM
15 years 4 months ago
Mining periodic-frequent patterns with maximum items' support constraints
The single minimum support (minsup) based frequent pattern mining approaches like Apriori and FP-growth suffer from“rare item problem”while extracting frequent patterns. That...
R. Uday Kiran, P. Krishna Reddy