Sciweavers

8 search results - page 2 / 2
» uic 2009
Sort
View
UIC
2009
Springer
14 years 26 days ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
UIC
2009
Springer
14 years 26 days ago
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning
Abstract. In the last years, techniques for activity recognition have attracted increasing attention. Among many applications, a special interest is in the pervasive e-Health domai...
Daniele Riboni, Claudio Bettini
UIC
2009
Springer
13 years 10 months ago
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System
The major surveillance camera manufacturers have begun incorporating wireless networking functionality into their products to enable wireless access. However, the video feeds from ...
Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portman...