Sciweavers

159 search results - page 26 / 32
» Automated Hoarding for Mobile Computers
Sort
View
SOSP
2003
ACM
14 years 5 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
CHI
2004
ACM
14 years 8 months ago
Dual ecologies of robot as communication media: thoughts on coordinating orientations and projectability
The aim of our study is to investigate systems for supporting remote instruction via a mobile robot. In the real world, instructions are typically given through words and body ori...
Hideaki Kuzuoka, Keiichi Yamazaki, Akiko Yamazaki,...
WINET
2010
178views more  WINET 2010»
13 years 3 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
CHI
2011
ACM
13 years 13 hour ago
MediaDiver: viewing and annotating multi-view video
We propose to bring our novel rich media interface called MediaDiver demonstrating our new interaction techniques for viewing and annotating multiple view video. The demonstration...
Gregor Miller, Sidney Fels, Abir Al Hajri, Michael...
SIGCOMM
2012
ACM
11 years 11 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang