Sciweavers

13534 search results - page 2612 / 2707
» Modelling Human-Computer Interaction
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
IROS
2009
IEEE
170views Robotics» more  IROS 2009»
14 years 2 months ago
A programming architecture for smart autonomous underwater vehicles
— Autonomous underwater vehicles (AUVs) are an indispensable tool for marine scientists to study the world’s oceans. The Slocum glider is a buoyancy driven AUV designed for mis...
Hans C. Woithe, Ulrich Kremer
ATAL
2009
Springer
14 years 2 months ago
Graph-based methods for the analysis of large-scale multiagent systems
Multiagent systems are often characterized by complex, and sometimes unpredictable interactions amongst their autonomous components. While these systems can provide robust and sca...
Wilbur Peng, William Krueger, Alexander Grushin, P...
CIKM
2009
Springer
14 years 2 months ago
Group CRM: a new telecom CRM framework from social network perspective
The structure of customer communication network provides us a natural way to understand customers’ relationships. Traditional customer relationship management (CRM) methods focu...
Bin Wu, Qi Ye, Shengqi Yang, Bai Wang
MICAI
2009
Springer
14 years 2 months ago
People Detection by a Mobile Robot Using Stereo Vision in Dynamic Indoor Environments
People detection and tracking is a key issue for social robot design and effective human robot interaction. This paper addresses the problem of detecting people with a mobile robo...
José Alberto Méndez-Polanco, Ang&eac...
« Prev « First page 2612 / 2707 Last » Next »