Sciweavers

90 search results - page 15 / 18
» Tracking User Mobility to Detect Suspicious Behavior.
Sort
View
AIRWEB
2007
Springer
14 years 1 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
MHCI
2009
Springer
14 years 1 months ago
HoverFlow: expanding the design space of around-device interaction
In this paper we explore the design space of around-device interaction (ADI). This approach seeks to expand the interaction possibilities of mobile and wearable devices beyond the...
Sven G. Kratz, Michael Rohs
WMCSA
2009
IEEE
14 years 2 months ago
BALANCE: towards a usable pervasive wellness application with accurate activity inference
Technology offers the potential to objectively monitor people‘s eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long...
Tamara Denning, Adrienne H. Andrew, Rohit Chaudhri...
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 7 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
PRESENCE
2006
197views more  PRESENCE 2006»
13 years 7 months ago
A Spring Model for Whole-Hand Virtual Grasping
We present a physically-based approach to grasping and manipulation of virtual objects that produces visually realistic results, addresses the problem of visual interpenetration o...
Christoph W. Borst, Arun P. Indugula