Sciweavers

2399 search results - page 464 / 480
» On Authentication between Human and Computer
Sort
View
DGO
2011
285views Education» more  DGO 2011»
12 years 7 months ago
Social media use by government: from the routine to the critical
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available....
Andrea L. Kavanaugh, Edward A. Fox, Steven D. Shee...
SIGCOMM
2012
ACM
11 years 10 months ago
TUBE: time-dependent pricing for mobile data
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet usage-based pricing still requires IS...
Sangtae Ha, Soumya Sen, Carlee Joe-Wong, Youngbin ...
BMCBI
2010
88views more  BMCBI 2010»
13 years 8 months ago
FastTagger: an efficient algorithm for genome-wide tag SNP selection using multi-marker linkage disequilibrium
Background: Human genome contains millions of common single nucleotide polymorphisms (SNPs) and these SNPs play an important role in understanding the association between genetic ...
Guimei Liu, Yue Wang, Limsoon Wong
MOBISYS
2009
ACM
14 years 8 months ago
A framework of energy efficient mobile sensing for automatic user state recognition
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based se...
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacob...
EWSN
2008
Springer
14 years 7 months ago
Radio Characterization of 802.15.4 and Its Impact on the Design of Mobile Sensor Networks
Future mobile sensing systems are being designed using 802.15.4 low-power short-range radios for a diverse set of devices from embedded mobile motes to sensor-enabled cellphones in...
Emiliano Miluzzo, Xiao Zheng, Kristof Fodor, Andre...