Sciweavers

356 search results - page 49 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
ICPPW
2009
IEEE
14 years 2 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
ACMSE
2009
ACM
14 years 2 months ago
The effects of network delay on task performance in a visual-haptic collaborative environment
Computer networks have grown considerably over the past decade. Faster and cheaper Internet connections have brought millions of PCs into a domain where rich content and fast down...
Benjamin M. Lambeth, James LaPlant, Elena Clapan, ...
SIGUCCS
2009
ACM
14 years 2 months ago
Getting iTunes U at Ithaca College up and running!
iTunes U is a free service from Apple that allows for the easy organization and distribution of content through iTunes. In the spring of 2008, Ithaca College signed a contract wit...
Beth M. Rugg
WOWMOM
2009
ACM
180views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
OPPORTUNITY: Towards opportunistic activity and context recognition systems
Opportunistic sensing allows to efficiently collect information about the physical world and the persons behaving in it. This may mainstream human context and activity recognitio...
Daniel Roggen, Kilian Förster, Alberto Calatr...
CCGRID
2008
IEEE
14 years 2 months ago
Grid Differentiated Services: A Reinforcement Learning Approach
—Large scale production grids are a major case for autonomic computing. Following the classical definition of Kephart, an autonomic computing system should optimize its own beha...
Julien Perez, Cécile Germain-Renaud, Bal&aa...