Sciweavers

304 search results - page 48 / 61
» Trusted Computing in Mobile Action
Sort
View
NLE
2007
148views more  NLE 2007»
13 years 7 months ago
Abbreviated text input using language modeling
We address the problem of improving the efficiency of natural language text input under degraded conditions (for instance, on mobile computing devices or by disabled users), by ta...
Stuart M. Shieber, Rani Nelken
ICRA
2010
IEEE
101views Robotics» more  ICRA 2010»
13 years 6 months ago
Searching for objects: Combining multiple cues to object locations using a maximum entropy model
— In this paper, we consider the problem of how background knowledge about usual object arrangements can be utilized by a mobile robot to more efficiently find an object in an ...
Dominik Joho, Wolfram Burgard
CHI
2005
ACM
14 years 8 months ago
Learning user interest for image browsing on small-form-factor devices
Mobile devices which can capture and view pictures are becoming increasingly common in our life. The limitation of these small-form-factor devices makes the user experience of ima...
Xing Xie, Hao Liu, Simon Goumaz, Wei-Ying Ma
OZCHI
2005
ACM
14 years 1 months ago
Technology for the humdrum: trajectories, interactional needs and a care setting
We report on a care setting where staff looking after ex-psychiatric patients were supported by mobile and stationery communications technology (e.g. mobile phones, a messaging sy...
Connor Graham, Keith Cheverst, Mark Rouncefield
RAID
2010
Springer
13 years 6 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...