Sciweavers

1553 search results - page 302 / 311
» Democracy Functions of Information Technology
Sort
View
DAWAK
2007
Springer
14 years 1 months ago
Mining Top-K Multidimensional Gradients
Several business applications such as marketing basket analysis, clickstream analysis, fraud detection and churning migration analysis demand gradient data analysis. By employing g...
Ronnie Alves, Orlando Belo, Joel Ribeiro
IPSN
2007
Springer
14 years 1 months ago
A platform for ubiquitous sensor deployment in occupational and domestic environments
In this paper, we introduce the “Plug” sensor network, a ubiquitous networked sensing platform ideally suited to broad deployment in environments where people work and live. T...
Joshua Lifton, Mark Feldmeier, Yasuhiro Ono, Camer...
ICMI
2005
Springer
104views Biometrics» more  ICMI 2005»
14 years 1 months ago
Analyzing and predicting focus of attention in remote collaborative tasks
To overcome the limitations of current technologies for remote collaboration, we propose a system that changes a video feed based on task properties, people’s actions, and messa...
Jiazhi Ou, Lui Min Oh, Susan R. Fussell, Tal Blum,...
LOCA
2005
Springer
14 years 1 months ago
MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking
In this paper, we present a robust, decentralized approach to RF-based location tracking. Our system, called MoteTrack, is based on low-power radio transceivers coupled with a mode...
Konrad Lorincz, Matt Welsh
CCS
2004
ACM
14 years 1 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...