Sciweavers

1774 search results - page 337 / 355
» Modeling and implementing software architecture with acme an...
Sort
View
WPES
2005
ACM
14 years 1 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
UIST
2004
ACM
14 years 1 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
CASES
2003
ACM
14 years 26 days ago
A low-power accelerator for the SPHINX 3 speech recognition system
Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice interfaces is clearly important. The continuous natur...
Binu K. Mathew, Al Davis, Zhen Fang
VLDB
2001
ACM
109views Database» more  VLDB 2001»
14 years 1 days ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...