Sciweavers

2347 search results - page 395 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
VR
2007
IEEE
151views Virtual Reality» more  VR 2007»
14 years 2 months ago
The Influence of Visual Appearance of User's Avatar on the Manipulation of Objects in Virtual Environments
This paper describes an experiment conducted to study the influence of visual appearance of user’s avatar (or 3D cursor) on the manipulation of virtual objects in Virtual Enviro...
Abdelmajid Kadri, Anatole Lécuyer, Jean-Mar...
VTC
2007
IEEE
14 years 2 months ago
Spatial Outage Probability Formula for CDMA Networks
— In this paper, we propose a new framework for the study of cellular networks called the fluid model and we derive from this model analytical formulas for interference, outage ...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
CIKM
2007
Springer
14 years 2 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
CSR
2007
Springer
14 years 2 months ago
Ruling Out Polynomial-Time Approximation Schemes for Hard Constraint Satisfaction Problems
The maximum constraint satisfaction problem (Max CSP) is the following computational problem: an instance is a finite collection of constraints on a set of variables, and the goal...
Peter Jonsson, Andrei A. Krokhin, Fredrik Kuivinen
ER
2007
Springer
128views Database» more  ER 2007»
14 years 2 months ago
Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering
The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
Luis Otávio Alvares, Vania Bogorny, Jos&eac...