Sciweavers

2713 search results - page 140 / 543
» Designing Personal Tele-Embodiment
Sort
View
ISWC
1999
IEEE
14 years 1 months ago
When Cyborgs Meet: Building Communities of Cooperating Wearable Agents
This paper introduces the notion of a Wearable Community as a group of wearable users who cooperate for their mutual benefit. In such a community, wearable computers act as person...
Gerd Kortuem, Jay Schneider, Jim Suruda, Stephen F...
BCS
2008
13 years 10 months ago
Automation of the Complete Sample Management in a Biotech Laboratory
Both Robots and Personal Computers established new markets about 30 years ago and were enabling factors in Automation and Information Technology. However, while you can see Person...
Martin Wojtczyk, Michael Marszalek, Alois Knoll, R...
IJNSEC
2008
85views more  IJNSEC 2008»
13 years 9 months ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
ISSA
2008
13 years 10 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
MOBICOM
2010
ACM
13 years 9 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...