Sciweavers

90 search results - page 6 / 18
» It's Not What You Have, But How You Use It: Compromises in M...
Sort
View
IEEEMM
2000
120views more  IEEEMM 2000»
13 years 7 months ago
Gaze Awareness for Video-Conferencing: A Software Approach
reness has more abstract social value: People who use frequent eye contact are perceived as more attentive, friendly, cooperative, confident, mature, and sincere than those who avo...
Jim Gemmell, Kentaro Toyama, C. Lawrence Zitnick, ...
ICMCS
2007
IEEE
163views Multimedia» more  ICMCS 2007»
14 years 1 months ago
An Augmented Reality Interface for Mobile Information Retrieval
Recent years have seen growing interest in mobile augmented reality. The ability to retrieve information and display it as virtual content overlaid on top of an image of the real ...
Jonathan Mooser, Lu Wang, Suya You, Ulrich Neumann
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav

Book
455views
15 years 3 months ago
The Design Patterns Java Companion
"The term “design patterns” sounds a bit formal to the uninitiated and can be somewhat off-putting when you first encounter it. But, in fact, design patterns are just co...
James W. Cooper
UIST
2010
ACM
13 years 5 months ago
SqueezeBlock: using virtual springs in mobile devices for eyes-free interaction
Haptic feedback provides an additional interaction channel when auditory and visual feedback may not be appropriate. We present a novel haptic feedback system that changes its ela...
Sidhant Gupta, Tim Campbell, Jeffrey R. Hightower,...