Sciweavers

6320 search results - page 1000 / 1264
» Towards Situated Computing
Sort
View
IJSR
2010
107views more  IJSR 2010»
15 years 3 months ago
Multi-model Hypothesis Group Tracking and Group Size Estimation
Abstract— People in densely populated environments typically form groups that split and merge. In this paper we track groups of people so as to reflect this formation process an...
Boris Lau, Kai Oliver Arras, Wolfram Burgard
INFOCOM
2010
IEEE
15 years 3 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
ITIIS
2010
265views more  ITIIS 2010»
15 years 3 months ago
A Recommender System for Device Sharing Based on Context-Aware and Personalization
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
Jong-Hyun Park
IWC
2010
164views more  IWC 2010»
15 years 3 months ago
Human-computer interaction: A stable discipline, a nascent science, and the growth of the long tail
  This paper represents a personal view of the state of HCI as a design discipline and as a  scientific discipline, and how this is changing in the face...
Alan J. Dix
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
15 years 3 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
« Prev « First page 1000 / 1264 Last » Next »