Sciweavers

3042 search results - page 191 / 609
» Designing for all users: including the odd users
Sort
View
ESWA
2006
123views more  ESWA 2006»
13 years 9 months ago
Design of a RFID case-based resource management system for warehouse operations
In the past, the selection of resources to execute various warehouse operation services was done solely by experts. In this paper, a RFIDbased Resource Management System (RFID-RMS...
Harry K. H. Chow, King Lun Choy, W. B. Lee, K. C. ...
CHI
2005
ACM
14 years 9 months ago
Design and analysis of delimiters for selection-action pen gesture phrases in scriboli
We present a quantitative analysis of delimiters for pen gestures. A delimiter is "something different" in the input stream that a computer can use to determine the stru...
François Guimbretière, Gonzalo Ramos...
ISI
2007
Springer
14 years 3 months ago
Design and Implementation of a Middleware for Sentient Spaces
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyu...
IPSN
2005
Springer
14 years 2 months ago
Virtual patrol: a new power conservation design for surveillance using sensor networks
Surveillance has been a typical application of wireless sensor networks. To conduct surveillance of a given area in real life, one can use stationary watch towers, or can also use...
Chao Gui, Prasant Mohapatra
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
14 years 2 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...