Sciweavers

589 search results - page 70 / 118
» Evaluating mobile phones as risk information providers
Sort
View
SOSP
2003
ACM
14 years 5 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
ICWMC
2006
IEEE
14 years 2 months ago
A Predictive Handoff Approach for Mobile IP
: We present a predictive handoff mechanism that can predict the occurrence of L2 handoff well. It can be used as a trigger for Mobile IP to start network layer handoff ahead exact...
Da-Wei Zhang, Yi Yao
ROBIO
2006
IEEE
148views Robotics» more  ROBIO 2006»
14 years 2 months ago
A Dynamic MDS-Based Localization Algorithm for Mobile Sensor Networks
Abstract— In this paper, we proposed a dynamic mobilityassisted MDS-based localization algorithms for sparse mobile sensor network. For sparse networks, the assumption of the exi...
Changhua Wu, Weihua Sheng, Wen-Zhan Song
CHI
2006
ACM
14 years 9 months ago
Direct pointer: direct manipulation for large-display interaction using handheld cameras
This paper describes the design and evaluation of a technique, Direct Pointer, that enables users to interact intuitively with large displays using cameras equipped on handheld de...
Hao Jiang, Eyal Ofek, Neema Moraveji, Yuanchun Shi
MHCI
2009
Springer
14 years 3 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...