Sciweavers

108 search results - page 5 / 22
» The strength of non-size increasing computation
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
HUC
2005
Springer
14 years 1 months ago
A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping
The ubiquitous computing community has widely researched the use of 802.11 for the purpose of location inference. Meanwhile, Bluetooth is increasingly widely deployed due to its lo...
Anil Madhavapeddy, Alastair Tse
BCSHCI
2008
13 years 9 months ago
Critical issues in interaction design
Computing technology is now so entwined with everyday life that enquiries into human computer interaction (HCI) are also studies of society and culture Cultural and Critical theor...
Mark Blythe, Jeffrey Bardzell, Shaowen Bardzell, A...
ICPR
2004
IEEE
14 years 8 months ago
Articulate Hand Motion Capturing Based on a Monte Carlo Nelder-Mead Simplex Tracker
This paper presents an algorithm for tracking the articulate hand motion in monocular video sequences. The task is challenging due to the high degrees of freedom involved in the h...
John Lin, Thomas S. Huang, Ying Wu
ICASSP
2008
IEEE
14 years 2 months ago
Factorized variational approximations for acoustic multi source localization
Estimation based on received signal strength (RSS) is crucial in sensor networks for sensor localization, target tracking, etc. In this paper, we present a Gaussian approximation ...
Volkan Cevher, Aswin C. Sankaranarayanan, Rama Che...