Sciweavers

1013 search results - page 111 / 203
» Real Time - Mach Timers: Exporting Time to the User
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
14 years 2 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
ICDCSW
2007
IEEE
14 years 2 months ago
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
Mao Yang, Qinyuan Feng, Yafei Dai, Zheng Zhang
NORDICHI
2006
ACM
14 years 1 months ago
Designing familiar open surfaces
While participatory design makes end-users part of the design process, we might also want the resulting system to be open for interpretation, appropriation and change over time to...
Kristina Höök
ICMI
2004
Springer
196views Biometrics» more  ICMI 2004»
14 years 1 months ago
Evaluation of spoken multimodal conversation
Spoken multimodal dialogue systems in which users address faceonly or embodied interface agents have been gaining ground in research for some time. Although most systems are still...
Niels Ole Bernsen, Laila Dybkjær