Sciweavers

829 search results - page 135 / 166
» Customizable Pervasive Applications
Sort
View
INTERACT
2007
13 years 11 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
ISUVR
2007
13 years 11 months ago
Virtual Reality in Ubiquitous Computing Environment
—In this paper, we propose a novel concept of Ubiquitous Virtual Reality (U-VR) and examine technical challenges to be required for realizing it. It is difficult to realize Virtu...
Youngjung Suh, Kiyoung Kim, JoungHyun Han, Woontac...
RIAO
2000
13 years 11 months ago
Multimedia structuring using trees
Traditionally work on multimedia structuring has been centered on the creation of indices and their use for searching. Although searching is important there are many cases where t...
George Tzanetakis, Luc Julia
HUC
2010
Springer
13 years 10 months ago
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
CCR
2006
90views more  CCR 2006»
13 years 9 months ago
CRAWDAD: a community resource for archiving wireless data at Dartmouth
Wireless network researchers are seriously starved for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, a Community R...
Jihwang Yeo, David Kotz, Tristan Henderson