Sciweavers

92 search results - page 7 / 19
» Is Context-Aware Computing Taking Control away from the User
Sort
View
112
Voted
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
EGITALY
2011
14 years 3 months ago
Gestural Interaction for Robot Motion Control
Recent advances in gesture recognition made the problem of controlling a humanoid robot in the most natural possible way an interesting challenge. Learning from Demonstration fie...
Giuseppe Broccia, Marco Livesu, Riccardo Scateni
ICCSA
2004
Springer
15 years 9 months ago
A Comparison Study of Metaheuristic Techniques for Providing QoS to Avatars in DVE Systems
Abstract. Network-server architecture has become a de-facto standard for Distributed Virtual Environment (DVE) systems. In these systems, a large set of remote users share a 3D vir...
Pedro Morillo, Juan M. Orduña, Marcos Fern&...
SAINT
2005
IEEE
15 years 9 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
AVI
2006
15 years 5 months ago
Mobility agents: guiding and tracking public transportation users
Increasingly, public transportation systems are equipped with Global Positioning Systems (GPS) connected to control centers through wireless networks. Controllers use this infrast...
Alexander Repenning, Andri Ioannidou