Sciweavers

13224 search results - page 55 / 2645
» Self-monitoring for Computer Users
Sort
View
IJISTA
2010
109views more  IJISTA 2010»
13 years 8 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...
ASSETS
2010
ACM
13 years 7 months ago
Iwalk: a lightweight navigation system for low-vision users
Smart phones typically support a range of GPS-enabled navigation services. However, most navigation services on smart phones are of limited use to people with visual disabilities....
Amanda J. Stent, Shiri Azenkot, Ben Stern
INFOCOM
2011
IEEE
13 years 1 months ago
A nearly-optimal index rule for scheduling of users with abandonment
—We analyze a comprehensive model for multi-class job scheduling accounting for user abandonment, with the objective of minimizing the total discounted or time-average sum of lin...
Urtzi Ayesta, Peter Jacko, Vladimir Novak
INFOCOM
2010
IEEE
13 years 8 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 7 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel