Sciweavers

1662 search results - page 116 / 333
» Privately Finding Specifications
Sort
View
112
Voted
CHI
2005
ACM
16 years 4 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
ICIAP
2003
ACM
16 years 3 months ago
Content-based video summarization and adaptation for ubiquitous media access
Today's mobile and wireless users access multimedia content from different types of networks and terminals. Content analysis plays a critical role in developing effective sol...
Shih-Fu Chang
MOBISYS
2005
ACM
16 years 3 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
124
Voted
EWSN
2006
Springer
16 years 3 months ago
Constrained Tracking on a Road Network
Many applications of wireless ad hoc sensor and actuator networks (WSANs) rely on the knowledge of node locations. These are challenging to obtain when nodes are mobile and are not...
Matthias Grossglauser, Michal Piórkowski
112
Voted
CSCW
2010
ACM
16 years 19 days ago
Understanding family communication across time zones
Nowadays it has become increasingly common for family members to be distributed in different time zones. These time differences pose specific challenges for communication within t...
Xiang Cao, Abigail Sellen, A. J. Bernheim Brush, D...