Sciweavers

1354 search results - page 193 / 271
» Discovery Systems in Ubiquitous Computing
Sort
View
ACMDIS
2006
ACM
14 years 3 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
CONEXT
2009
ACM
13 years 10 months ago
FairTorrent: bringing fairness to peer-to-peer systems
Peer-to-Peer file-sharing applications suffer from a fundamental problem of unfairness. Free-riders cause slower download times for others by contributing little or no upload band...
Alex Sherman, Jason Nieh, Clifford Stein
CHI
2006
ACM
14 years 9 months ago
Whither or whether HCI: requirements analysis for multi-sited, multi-user cyberinfrastructures
Cyberinfrastructures bring together distributed resources to support scientific discoveries. Cyberinfrastructures currently under development are intended to enable the cooperativ...
Ann Zimmerman, Bonnie A. Nardi
DSN
2002
IEEE
14 years 2 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
HUC
2005
Springer
14 years 2 months ago
A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping
The ubiquitous computing community has widely researched the use of 802.11 for the purpose of location inference. Meanwhile, Bluetooth is increasingly widely deployed due to its lo...
Anil Madhavapeddy, Alastair Tse