Sciweavers

858 search results - page 160 / 172
» User Authentication in Sensor Networks
Sort
View
IJMMS
2007
166views more  IJMMS 2007»
14 years 9 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...
SIGCOMM
1998
ACM
15 years 2 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
GI
2009
Springer
15 years 2 months ago
En passant Coupon Collection
: Spontaneous interaction in public places has evolved as crucial concern in interaction design, particularly in the domain of public advertising. Implicit interaction is a mode of...
Alois Ferscha, Wolfram Swoboda, Christoph Wimberge...
CHI
2007
ACM
15 years 10 months ago
iStuff mobile: rapidly prototyping new mobile phone interfaces for ubiquitous computing
iStuff Mobile is the first rapid prototyping framework that helps explore new sensor-based interfaces with existing mobile phones. It focuses on sensor-enhanced physical interface...
Rafael Ballagas, Faraz Memon, Rene Reiners, Jan O....
SENSYS
2005
ACM
15 years 3 months ago
MAX: human-centric search of the physical world
MAX is a system that facilitates human-centric search of the physical world. It allows humans to search for and locate objects as and when they need it instead of organizing them ...
Kok-Kiong Yap, Vikram Srinivasan, Mehul Motani