Sciweavers

6861 search results - page 152 / 1373
» Security for Ubiquitous Computing
Sort
View
EUSAI
2007
Springer
15 years 10 months ago
How Computer Vision Can Help in Outdoor Positioning
Localization technologies have been an important focus in ubiquitous computing. This paper explores an underrepresented area, namely computer vision technology, for outdoor positio...
Ulrich Steinhoff, Dusan Omercevic, Roland Perko, B...
UIST
2003
ACM
15 years 9 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 10 months ago
Exploiting Our Computational Surroundings for Better Mobile Collaboration
Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available ...
João Pedro Barreto, Paulo Ferreira, Marc Sh...
IJCV
2006
115views more  IJCV 2006»
15 years 4 months ago
An Analysis of Linear Subspace Approaches for Computer Vision and Pattern Recognition
: Linear subspace analysis (LSA) has become rather ubiquitous in a wide range of problems arising in pattern recognition and computer vision. The essence of these approaches is tha...
Pei Chen, David Suter
AINA
2004
IEEE
15 years 8 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi