Sciweavers

195 search results - page 8 / 39
» Hiding the complexity of LBS
Sort
View
ACMDIS
2006
ACM
14 years 1 months ago
The spatial character of sensor technology
By considering the spatial character of sensor-based interactive systems, this paper investigates how discussions of seams and seamlessness in ubiquitous computing neglect the com...
Stuart Reeves, Tony P. Pridmore, Andy Crabtree, Jo...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 7 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
VIIP
2001
13 years 9 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
IJFCS
2008
98views more  IJFCS 2008»
13 years 7 months ago
On Succinct Representation of Knowledge Community Taxonomies with Formal Concept Analysis
We present an application of formal concept analysis aimed at representing a meaningful structure of knowledge communities in the form of a lattice-based taxonomy. The taxonomy gr...
Camille Roth, Sergei A. Obiedkov, Derrick G. Kouri...
CORR
2007
Springer
149views Education» more  CORR 2007»
13 years 7 months ago
Very fast watermarking by reversible contrast mapping
—Reversible contrast mapping (RCM) is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits...
Dinu Coltuc, Jean-Marc Chassery