Sciweavers

4360 search results - page 825 / 872
» Socio-technical systems: From design methods to systems engi...
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
SAC
2010
ACM
14 years 2 months ago
Mobile air pollution monitoring network
Current methods of estimating air quality involve assigning a single value called the Air Quality Index (AQI) to a large land area for a 24-hour period based on a very few, sparse...
W. Hedgecock, Péter Völgyesi, Á...
ICASSP
2008
IEEE
14 years 2 months ago
Cooperative MIMO-beamforming for multiuser relay networks
In this paper, we develop a beamforming algorithm for multiuser MIMO-relaying wireless systems. We consider a relaying scenario with multiple sources transmitting to one or more d...
Amr El-Keyi, Benoît Champagne
ICC
2008
IEEE
143views Communications» more  ICC 2008»
14 years 2 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ICRA
2008
IEEE
108views Robotics» more  ICRA 2008»
14 years 2 months ago
Detecting structural ambiguities and transitions during a guided tour
— Service robots designed for domestic settings need to navigate in an environment that they have to share with their users. Thus, they have to be able to report their current st...
Elin Anna Topp, Henrik I. Christensen