Sciweavers

3937 search results - page 243 / 788
» Questioning Ubiquitous Computing
Sort
View
APCHI
2004
IEEE
15 years 8 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
ANTSW
2006
Springer
15 years 8 months ago
Autonomous Gossiping of Information in a P2P Network with Artificial Ants
Abstract. They appeared in our life some years ago with the awakening of the PC and now the are everywhere : computers have become ubiquitous and, almost, irreplaceable. Classical ...
Christophe Guéret, Nicolas Monmarché...
SGP
2007
15 years 6 months ago
Discrete laplace operators: no free lunch
Discrete Laplace operators are ubiquitous in applications spanning geometric modeling to simulation. For robustness and efficiency, many applications require discrete operators th...
Max Wardetzky, Saurabh Mathur, Felix Kälberer...
CHI
2010
ACM
15 years 6 months ago
Countertop responsive mirror: supporting physical retail shopping for sellers, buyers and companions
We examine opportunities for ubiquitous technologies in retail shopping, jewelry shopping in this case, to supplement the unique information needs inherent to physical trials of t...
Maurice Chu, Brinda Dalal, Alan Walendowski, Bo Be...
ISICT
2003
15 years 5 months ago
Towards a natural interface to adaptive service composition
As computers become ubiquitous in our every day lives, providing a means for true user empowerment will become crucial. Techniques which allow dynamic reuse and composition of exi...
Steffen Higel, Tony O'Donnell, Vincent Wade