Sciweavers

1018 search results - page 33 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2009
ACM
16 years 11 days ago
Touch and toys: new techniques for interaction with a remote group of robots
Interaction with a remote team of robots in real time is a difficult human-robot interaction (HRI) problem exacerbated by the complications of unpredictable realworld environments...
Cheng Guo, James Everett Young, Ehud Sharlin
ACMACE
2010
ACM
14 years 6 months ago
Tangible anchoring: grasping news and public opinion
Tangible Anchoring explores potential practices for news reporting and analysis afforded by the convergence of tabletop computing forms, broadcast media, and user-generated conten...
Susan J. Robinson, Sam Mendenhall, Vedrana Novosel...
GRID
2006
Springer
14 years 11 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
EGC
2005
Springer
15 years 5 months ago
Experiences of Applying Advanced Grid Authorisation Infrastructures
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
JNW
2008
101views more  JNW 2008»
14 years 11 months ago
Micro-controller based Remote Monitoring using Mobile through Spoken Commands
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...