Sciweavers

889 search results - page 155 / 178
» The Design and Implementation of a Wireless Video Surveillan...
Sort
View
PUC
2008
113views more  PUC 2008»
14 years 9 months ago
A resource and context model for mobile middleware
Abstract Mobile computing systems should be selfmanaged to simplify operation and maintenance plus meet user's expectation with respect to Quality of Service (QoS). When archi...
Sten Lundesgaard Amundsen, Frank Eliassen
IJMHCI
2010
126views more  IJMHCI 2010»
14 years 7 months ago
Cocktail: Exploiting Bartenders' Gestures for Mobile Interaction
Recent mobile devices are capable of creating and storing a large amount of multimedia data, but sharing those data with others is still challenging. This paper presents Cocktail,...
Jong-Woon Yoo, Woomin Hwang, Hyunchul Seok, Sung K...
MOBISYS
2009
ACM
15 years 10 months ago
SoundSense: scalable sound sensing for people-centric applications on mobile phones
Top end mobile phones include a number of specialized (e.g., accelerometer, compass, GPS) and general purpose sensors (e.g., microphone, camera) that enable new people-centric sen...
Hong Lu, Wei Pan, Nicholas D. Lane, Tanzeem Choudh...
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
PET
2004
Springer
15 years 3 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny