Sciweavers

144227 search results - page 28657 / 28846
» Using the
Sort
View
137
Voted
UIST
2010
ACM
15 years 1 months ago
A framework for robust and flexible handling of inputs with uncertainty
New input technologies (such as touch), recognition based input (such as pen gestures) and next-generation interactions (such as inexact interaction) all hold the promise of more ...
Julia Schwarz, Scott E. Hudson, Jennifer Mankoff, ...
148
Voted
USS
2010
15 years 1 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
217
Voted
VRST
2010
ACM
15 years 1 months ago
An adaptive training-free feature tracker for mobile phones
While tracking technologies based on fiducial markers have dominated the development of Augmented Reality (AR) applications for almost a decade, various real-time capable approach...
Jan Herling, Wolfgang Broll
162
Voted
VTC
2010
IEEE
156views Communications» more  VTC 2010»
15 years 1 months ago
A Unified MIMO Architecture Subsuming Space Shift Keying, OSTBC, BLAST and LDC
In this paper, motivated by the recent concept of Spatial Modulation (SM), we propose a novel Generalized Space-Time Shift Keying (G-STSK) architecture, which acts as a unified Mul...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
190
Voted
WCET
2010
15 years 1 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
« Prev « First page 28657 / 28846 Last » Next »