Sciweavers

580 search results - page 75 / 116
» The Interaction of Access Control and Object-Orientation in ...
Sort
View
CHI
2011
ACM
14 years 5 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...
CHI
2011
ACM
14 years 5 months ago
Roboshop: multi-layered sketching interface for robot housework assignment and management
As various home robots come into homes, the need for efficient robot task management tools is arising. Current tools are designed for controlling individual robots independently, ...
Kexi Liu, Daisuke Sakamoto, Masahiko Inami, Takeo ...
CN
2004
109views more  CN 2004»
15 years 1 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
WPES
2003
ACM
15 years 7 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ICVS
2001
Springer
15 years 6 months ago
A Framework for Generic State Estimation in Computer Vision Applications
Abstract. Experimenting and building integrated, operational systems in computational vision poses both theoretical and practical challenges, involving methodologies from control t...
Cristian Sminchisescu, Alexandru Telea