Sciweavers

485 search results - page 46 / 97
» Continuous Spatial Authentication
Sort
View
SPW
2000
Springer
13 years 11 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 7 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
ICIP
2008
IEEE
14 years 9 months ago
Cross-talk explained
The image sensor measurements are subject to degradation caused by the photon and electron leakage. The color image data acquired via a spatial subsampling procedure implemented a...
Keigo Hirakawa
ICPR
2010
IEEE
14 years 1 months ago
Keyframe-Guided Automatic Non-Linear Video Editing
We describe a system for generating coherent movies from a collection of unedited videos. The generation process is guided by one or more input keyframes, which determine the cont...
Vaishnavi Rajgopalan, Ananth Ranganathan, Ramgopal...
HICSS
2005
IEEE
119views Biometrics» more  HICSS 2005»
14 years 1 months ago
From Freedom to Involvement: On the Rhetoric of Mobility in HCI Research
The concept of ‘mobility’ as it is conceptualized in mobile HCI is scrutinized in this paper. The currently applied understanding is often limited to perceiving mobility as co...
Daniel Fallman