Sciweavers

5075 search results - page 986 / 1015
» Interaction Design for the Disappearing Computer
Sort
View
FOCS
2009
IEEE
14 years 2 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
ICNSC
2007
IEEE
14 years 2 months ago
Towards Robot-Assisted Mass-Casualty Triage
Abstract— This paper provides a discussion on how teleoperated robots could be utilized to do the simple triage of victims of a multiple casualty incident. Previous work in the a...
Carolina Chang, Robin R. Murphy
MUE
2007
IEEE
102views Multimedia» more  MUE 2007»
14 years 1 months ago
Ubiquitous Multimedia Information Delivering Service for Smart Home
In ubiquitous computing environments like smart home, residents can conveniently enjoy various home entertainments, such as watching TV, listening music, etc, through invisible an...
Jenq-Muh Hsu, Wei-Juing Wu, I-Ray Chang
EUSAI
2007
Springer
14 years 1 months ago
Portable Wireless Sensors for Object Usage Sensing in the Home: Challenges and Practicalities
A low-cost kit of stick-on wireless sensors that transmit data indicating whenever various objects are being touched or used might aid ubiquitous computing research efforts on rapi...
Emmanuel Munguia Tapia, Stephen S. Intille, Kent L...
ACSC
2006
IEEE
14 years 1 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi