Sciweavers

829 search results - page 137 / 166
» Customizable Pervasive Applications
Sort
View
MOBICOM
2010
ACM
13 years 10 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
ECCV
2008
Springer
14 years 11 months ago
Signature-Based Document Image Retrieval
As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effectiv...
Guangyu Zhu, Yefeng Zheng, David S. Doermann
CCS
2009
ACM
14 years 10 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
CHI
2007
ACM
14 years 10 months ago
Exploring augmented live video streams for remote participation
Augmented video streams display information within the context of the physical environment. In contrast to Augmented Reality, they do not require special equipment, they can suppo...
Irma Lindt, Jan Herling, Jan Ohlenburg, Michael Wi...
VLSID
2002
IEEE
123views VLSI» more  VLSID 2002»
14 years 10 months ago
Compiler-Directed Array Interleaving for Reducing Energy in Multi-Bank Memories
With the increased use of embedded/portable devices such as smart cellular phones, pagers, PDAs, hand-held computers, and CD players, improving energy efficiency is becoming a cri...
Victor Delaluz, Mahmut T. Kandemir, Narayanan Vija...