Sciweavers

973 search results - page 25 / 195
» Personal Tele-Immersion Devices
Sort
View
PAIRING
2010
Springer
152views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Threshold cryptography has been used to secure data and control access by sharing a private cryptographic key over different devices. This means that a minimum number of these dev...
Koen Simoens, Roel Peeters, Bart Preneel
MHCI
2009
Springer
14 years 4 months ago
Using handheld devices for mobile interaction with displays in home environments
An increasing number of households are equipped with a large number of TV sets and more and more of them are large highresolution displays. Furthermore, we see the integration of ...
Andreas Lorenz, Clara Fernandez De Castro, Enrico ...
ATAL
2006
Springer
14 years 1 months ago
A decision-theoretic approach to file consistency in constrained peer-to-peer device networks
As users interact with an increasing array of personal computing devices, maintaining consistency of data across those devices becomes significantly more difficult. Typical soluti...
David L. Roberts, Sooraj Bhat, Charles Lee Isbell ...
UIC
2007
Springer
14 years 4 months ago
Location-Based Recommendation System Using Bayesian User's Preference Model in Mobile Devices
As wireless communication advances, research on location-based services using mobile devices has attracted interest, which provides information and services related to user’s phy...
Moon-Hee Park, Jin-Hyuk Hong, Sung-Bae Cho
IEAAIE
2007
Springer
14 years 4 months ago
Generating Cartoon-Style Summary of Daily Life with Multimedia Mobile Devices
Mobile devices are treasure boxes of personal information containing user’s context, personal schedule, diary, short messages, photos, and videos. Also, user’s usage informatio...
Sung-Bae Cho, Kyung-Joong Kim, Keum-Sung Hwang