Sciweavers

2347 search results - page 280 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
ICMCS
2006
IEEE
126views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Detection and Removal of Long Scratch Lines in Aged Films
Historical films usually have defects. We study the type of defects, and propose a series of solutions to detect defects before they are repaired by our inpainting algorithms. Thi...
Timothy K. Shih, Louis H. Lin, Wonjun Lee
PODC
2005
ACM
14 years 1 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
HUC
2004
Springer
14 years 1 months ago
Everyday Encounters with Context-Aware Computing in a Campus Environment
As ubiquitous computing technologies mature, they must move out of laboratory settings and into the everyday world. In the process, they will increasingly be used by heterogeneous ...
Louise Barkhuus, Paul Dourish
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
14 years 1 months ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille
ISWC
2003
IEEE
14 years 1 months ago
Effects of Functionality on Perceived Comfort of Wearables
This paper presents results from a study examining the link between the functionality and the comfort of wearable computers. We gave participants two different devices to wear and...
Kerry Bodine, Francine Gemperle