Sciweavers

1573 search results - page 263 / 315
» Strong User Authentication
Sort
View
PERCOM
2003
ACM
15 years 9 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
ICDCS
2009
IEEE
15 years 7 months ago
MOPS: Providing Content-Based Service in Disruption-Tolerant Networks
—Content-based service, which dynamically routes and delivers events from sources to interested users, is extremely important to network services. However, existing content-based...
Feng Li, Jie Wu
CVPR
2010
IEEE
15 years 6 months ago
Ink-Bleed Reduction using Functional Minimization
Ink-bleed interference is undesirable as it reduces the legibility and aesthetics of affected documents. We present a novel approach to reduce ink-bleed interference using functio...
Grani Adiwena Hanasusanto, Michael Brown, Zheng Wu
ACHI
2010
IEEE
15 years 4 months ago
A Simulation Framework for Human-Robot Interaction
Abstract—The development of human-robot interaction scenarios is a strongly situation-dependent as well as an extremely dynamic task. Humans interacting with the robot directly r...
Norbert Schmitz, Jochen Hirth, Karsten Berns
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
15 years 4 months ago
Towards an Understanding of Social Software: The Case of Arinia
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Stuart J. Barnes, Martin Böhringer, Christian...