Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
We have designed and implemented new Web browsing facilities to support effective navigation on Personal Digital Assistants (PDAs) with limited capabilities: low bandwidth, small ...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...
Web pages often contain clutter (such as pop-up ads, unnecessary images and extraneous links) around the body of an article that distracts a user from actual content. Extraction o...
Suhit Gupta, Gail E. Kaiser, David Neistadt, Peter...
Multi-flick, which consists of repeated flick actions, has received media attention as an intuitive and natural document-scrolling technique for stylus based systems. In this pape...