Sciweavers

1224 search results - page 244 / 245
» Building systems that users want to use
Sort
View
PODS
2004
ACM
148views Database» more  PODS 2004»
14 years 6 months ago
Deterministic Wavelet Thresholding for Maximum-Error Metrics
Several studies have demonstrated the effectiveness of the wavelet decomposition as a tool for reducing large amounts of data down to compact wavelet synopses that can be used to ...
Minos N. Garofalakis, Amit Kumar
TRUST
2009
Springer
14 years 1 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
ACMACE
2009
ACM
14 years 1 months ago
Power explorer: a casual game style for encouraging long term behavior change among teenagers
When it comes to motivating teenagers towards energy awareness, new approaches need to be considered. One such is the use of pervasive games connected to the players own energy co...
Anton Gustafsson, Magnus Bång, Mattias Svahn
GRC
2007
IEEE
14 years 1 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
ACMDIS
2006
ACM
14 years 20 days ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...