Sciweavers

2347 search results - page 387 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
OZCHI
2009
ACM
14 years 2 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
ICS
2009
Tsinghua U.
14 years 2 months ago
Cancellation of loads that return zero using zero-value caches
The speed gap between processor and memory continues to limit performance. To address this problem, we explore the potential of eliminating Zero Loads—loads accessing memory loc...
Md. Mafijul Islam, Sally A. McKee, Per Stenstr&oum...
CIDM
2009
IEEE
14 years 2 months ago
Automatic analysis of eye tracking data for medical diagnosis
— Several studies have analyzed the link between mental dysfunctions and eye movements, using eye tracking techniques to determine where a person is looking, that is, the fixati...
Filippo Galgani, Yiwen Sun, Pier Luca Lanzi, Jason...
GLOBECOM
2009
IEEE
14 years 2 months ago
Rapidly-Deployable Mesh Network Testbed
—This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and mili...
Michael R. Souryal, Andreas Wapf, Nader Moayeri
GLOBECOM
2009
IEEE
14 years 2 months ago
Anonymous Cardinality Estimation in RFID Systems with Multiple Readers
— In this paper, we study the anonymous cardinality estimation problem in radio frequency identification (RFID) systems. To preserve privacy and anonymity, each tag only transmi...
Vahid Shah-Mansouri, Vincent W. S. Wong