Sciweavers

405 search results - page 52 / 81
» An Agent Construction Model for Ubiquitous Computing Devices
Sort
View
EUROCRYPT
2010
Springer
14 years 13 days ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
ASSETS
2005
ACM
13 years 9 months ago
Verification of computer display pre-compensation for visual aberrations in an artificial eye
The possibility of pre-compensating images in a computer display according to the visual aberrations previously assessed in an optical system (e.g., the computer user’s eye) has...
Miguel Alonso Jr., Armando Barreto, Julie A. Jacko...
EICS
2009
ACM
14 years 2 months ago
Engineering crowd interaction within smart environments
Smart environments (e.g., airports, hospitals, stadiums, and other physical spaces using ubiquitous computing to empower many mobile people) provide novel challenges for usability...
Michael D. Harrison, Mieke Massink, Diego Latella
BROADNETS
2007
IEEE
14 years 2 months ago
Goodput optimization in CSMA/CA wireless networks
—Packet based wireless networks have provided high data rates, and the desire for ubiquitous wireless computing is growing rapidly. To accommodate these demands, wireless systems...
Yusun Chang, Christopher P. Lee, John A. Copeland
MOBILITY
2009
ACM
14 years 9 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...