Sciweavers

464 search results - page 59 / 93
» Survey of position location techniques in mobile systems
Sort
View
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
PPSN
1998
Springer
14 years 1 months ago
A Decoder-Based Evolutionary Algorithm for Constrained Parameter Optimization Problems
Several methods have been proposed for handling nonlinear constraints by evolutionary algorithms for numerical optimization problems; a survey paper [7] provides an overview of var...
Slawomir Koziel, Zbigniew Michalewicz
CHI
2010
ACM
14 years 3 months ago
OneBusAway: results from providing real-time arrival information for public transit
Public transit systems play an important role in combating traffic congestion, reducing carbon emissions, and promoting compact, sustainable urban communities. The usability of p...
Brian Ferris, Kari Watkins, Alan Borning
GRAPHICSINTERFACE
2007
13 years 10 months ago
BlueTable: connecting wireless mobile devices on interactive surfaces using vision-based handshaking
Associating and connecting mobile devices for the wireless transfer of data is often a cumbersome process. We present a technique of associating a mobile device to an interactive ...
Andrew D. Wilson, Raman Sarin
SG
2009
Springer
14 years 3 months ago
Interactive Context-Aware Visualization for Mobile Devices
Abstract. Utilizing context information—e.g. location, user aspects, or hardware capabilities—enables the presented generic framework to automatically control the selection and...
Mike Eissele, Daniel Weiskopf, Thomas Ertl