Sciweavers

10797 search results - page 2118 / 2160
» Robust control applications
Sort
View
82
Voted
ACMACE
2008
ACM
15 years 26 days ago
Mobile exergaming
With many industrialized societies bearing the cost of an increasingly sedentary on the health of their populations there is a need to find new ways of encouraging physical activi...
Carlos Garcia Wylie, Paul Coulton
114
Voted
ATAL
2008
Springer
15 years 25 days ago
Emotional reading of medical texts using conversational agents
In this paper, we present a prototype that helps visualizing the relative importance of sentences extracted from medical texts using Embodied Conversational Agents (ECA). We propo...
Gersende Georg, Catherine Pelachaud, Marc Cavazza
CCS
2008
ACM
15 years 25 days ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
CCS
2008
ACM
15 years 25 days ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
IWCMC
2010
ACM
15 years 25 days ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
« Prev « First page 2118 / 2160 Last » Next »