Sciweavers

2846 search results - page 218 / 570
» Real World Teleconferencing
Sort
View
IEEEARES
2009
IEEE
14 years 4 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
CHI
2009
ACM
14 years 4 months ago
Tracking behavior in persuasive apps: is sensor-based detection always better than user self-reporting?
This paper aims to discuss the roles for the two types of tracking user behavior. Considering these two types of tracking, sensor based recognition has a great advantage when sens...
Miyuki Shiraishi, Yasuyuki Washio, Chihiro Takayam...
TEI
2009
ACM
92views Hardware» more  TEI 2009»
14 years 4 months ago
TinkerSheets: using paper forms to control and visualize tangible simulations
This paper describes TinkerSheets, a paper-based interface to tangible simulations. The proposed interface combines the advantages of form-based input and paper. Form-based input ...
Guillaume Zufferey, Patrick Jermann, Auréli...
EVOW
2009
Springer
14 years 4 months ago
Binary Exponential Back Off for Tabu Tenure in Hyperheuristics
In this paper we propose a new tabu search hyperheuristic which makes individual low level heuristics tabu dynamically using an analogy with the Binary Exponential Back Off (BEBO) ...
Stephen Remde, Keshav P. Dahal, Peter I. Cowling, ...
WEA
2009
Springer
111views Algorithms» more  WEA 2009»
14 years 4 months ago
A Heuristic for Fair Correlation-Aware Resource Placement
Abstract. The configuration of network resources greatly impacts the communication overhead for data intensive tasks and constitutes a critical problem in the design and maintenan...
Raouf Boutaba, Martin Karsten, Maxwell Young