Sciweavers

2713 search results - page 139 / 543
» Designing Personal Tele-Embodiment
Sort
View
WWW
2010
ACM
14 years 4 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
DEXA
2009
Springer
175views Database» more  DEXA 2009»
14 years 3 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 3 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
SASN
2005
ACM
14 years 2 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
CIKM
2009
Springer
14 years 1 months ago
iMecho: an associative memory based desktop search system
Traditional desktop search engines only support keyword based search that needs exact keyword matching to find resources. However, users generally have a vague picture of what is...
Jidong Chen, Hang Guo, Wentao Wu, Wei Wang 0009