Sciweavers

313 search results - page 51 / 63
» From mobile phones to responsible devices
Sort
View
RIA
2008
104views more  RIA 2008»
13 years 9 months ago
Scatterbox: Context-Aware Message Management
Applications that rely on mobile devices for user interaction must be mindful of the user's limited attention, which will typically be split between several competing tasks. C...
Stephen Knox, Ross Shannon, Lorcan Coyle, Adrian K...
MTA
2008
132views more  MTA 2008»
13 years 9 months ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla
ACMSE
2006
ACM
14 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
EDBT
2008
ACM
128views Database» more  EDBT 2008»
14 years 10 months ago
Processing transitive nearest-neighbor queries in multi-channel access environments
Wireless broadcast is an efficient way for information dissemination due to its good scalability [10]. Existing works typically assume mobile devices, such as cell phones and PDAs...
Xiao Zhang, Wang-Chien Lee, Prasenjit Mitra, Baihu...
ICDAR
2003
IEEE
14 years 3 months ago
Progress in Camera-Based Document Image Analysis
The increasing availability of high performance, low priced, portable digital imaging devices has created a tremendous opportunity for supplementing traditional scanning for docum...
David S. Doermann, Jian Liang, Huiping Li