Sciweavers

2399 search results - page 370 / 480
» On Authentication between Human and Computer
Sort
View
GROUP
2003
ACM
14 years 1 months ago
Technology for boundaries
This paper presents a study of an organisation, which is undergoing a process transforming organisational and technological boundaries. In particular, we shall look at three kinds...
Susanne Bødker, Jannie Friis Kristensen, Ch...
WINET
2010
178views more  WINET 2010»
13 years 2 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
ICALP
2009
Springer
14 years 8 months ago
Sorting and Selection with Imprecise Comparisons
Abstract. In experimental psychology, the method of paired comparisons was proposed as a means for ranking preferences amongst n elements of a human subject. The method requires pe...
Avinatan Hassidim, Jelani Nelson, Miklós Aj...
ESWS
2009
Springer
14 years 2 months ago
A Reasoning-Based Support Tool for Ontology Mapping Evaluation
In this paper we describe a web-based tool that supports the human in revising ontology alignments. Our tool uses logical reasoning as a basis for detecting conflicts in mappings ...
Christian Meilicke, Heiner Stuckenschmidt, Ondrej ...
SENSYS
2005
ACM
14 years 1 months ago
Cyclops: in situ image sensing and interpretation in wireless sensor networks
Despite their increasing sophistication, wireless sensor networks still do not exploit the most powerful of the human senses: vision. Indeed, vision provides humans with unmatched...
Mohammad H. Rahimi, Rick Baer, Obimdinachi I. Iroe...