Sciweavers

4482 search results - page 679 / 897
» The Crowdsourcing Design Space
Sort
View
IVIC
2009
Springer
14 years 3 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...
LION
2009
Springer
145views Optimization» more  LION 2009»
14 years 3 months ago
A Variable Neighborhood Descent Search Algorithm for Delay-Constrained Least-Cost Multicast Routing
Abstract. The rapid evolution of real-time multimedia applications requires Quality of Service (QoS) based multicast routing in underlying computer networks. The constrained Steine...
Rong Qu, Ying Xu, Graham Kendall
EICS
2009
ACM
14 years 3 months ago
Engineering crowd interaction within smart environments
Smart environments (e.g., airports, hospitals, stadiums, and other physical spaces using ubiquitous computing to empower many mobile people) provide novel challenges for usability...
Michael D. Harrison, Mieke Massink, Diego Latella
SIGCOMM
2009
ACM
14 years 3 months ago
Opportunistic forwarding in workplaces
So far, the search for Opportunistic Network (ON) applications has focused on urban/rural scenarios where the combined use of mobility and the store-carry-and-forward paradigm hel...
Sabrina Gaito, Elena Pagani, Gian Paolo Rossi
UIST
2009
ACM
14 years 3 months ago
Virtual shelves: interactions with orientation aware devices
Triggering shortcuts or actions on a mobile device often requires a long sequence of key presses. Because the functions of buttons are highly dependent on the current applicationâ...
Frank Chun Yat Li, David Dearman, Khai N. Truong