Sciweavers

270 search results - page 44 / 54
» Pervasive maps: Explore and interact with pervasive environm...
Sort
View
87
Voted
ACMACE
2004
ACM
15 years 3 months ago
Extending game participation with embodied reporting agents
We introduce a multi-agent framework to generate reports of players' activities within multi-player computer games so that other players who are currently unable to participa...
Dan Fielding, Mike Fraser, Brian Logan, Steve Benf...
COMPSEC
2010
93views more  COMPSEC 2010»
14 years 9 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
88
Voted
PEPM
2007
ACM
15 years 3 months ago
Tasks: language support for event-driven programming
The event-driven programming style is pervasive as an efficient method for interacting with the environment. Unfortunately, the event-driven style severely complicates program mai...
Jeffrey Fischer, Rupak Majumdar, Todd D. Millstein
62
Voted
ICRA
1999
IEEE
119views Robotics» more  ICRA 1999»
15 years 1 months ago
Development of a Visual Space-Mouse
The pervasiveness of computers in everyday life coupled with recent rapid advances in computer technology have created both the need and the means for sophisticated Human Computer...
Tobias Peter Kurpjuhn, Alexa Hauck, Kevin Nickels,...
CCS
2008
ACM
14 years 11 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton