Sciweavers

1856 search results - page 174 / 372
» Phoning it in
Sort
View
81
Voted
CHI
2010
ACM
15 years 7 months ago
Video microblogging: your 12 seconds of fame
Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of...
Nis Bornoe, Louise Barkhuus
106
Voted
CHI
2009
ACM
15 years 7 months ago
See you on the subway: exploring mobile social software
This project explores the social possibilities of mobile technology in transitional spaces such as public transport. Based on a cultural probes study of Stockholm subway commuters...
Nicolas Belloni, Lars Erik Holmquist, Jakob Tholan...
70
Voted
DAC
2009
ACM
15 years 7 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
93
Voted
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
99
Voted
CRV
2009
IEEE
156views Robotics» more  CRV 2009»
15 years 7 months ago
A Bayesian Algorithm for Reading 1D Barcodes
The 1D barcode is a ubiquitous labeling technology, with symbologies such as UPC used to label approximately 99% of all packaged goods in the US. It would be very convenient for c...
Ender Tekin, James Coughlan