Sciweavers

304 search results - page 8 / 61
» Trusted Computing in Mobile Action
Sort
View
CHI
2009
ACM
14 years 8 months ago
A vehicle for research: using street sweepers to explore the landscape of environmental community action
Researchers are developing mobile sensing platforms to facilitate public awareness of environmental conditions. However, turning such awareness into practical community action and...
Paul M. Aoki, R. J. Honicky, Alan M. Mainwaring, C...
HPCC
2007
Springer
14 years 1 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
CVPR
2006
IEEE
14 years 9 months ago
Successive Convex Matching for Action Detection
We propose human action detection based on a successive convex matching scheme. Human actions are represented as sequences of postures and specific actions are detected in video b...
Hao Jiang, Mark S. Drew, Ze-Nian Li
CHI
2010
ACM
13 years 5 months ago
Trying too hard: effects of mobile agents' (Inappropriate) social expressiveness on trust, affect and compliance
Mobile services can provide users with information relevant to their current circumstances. Distant services in turn can acquire local information from people in an area of intere...
Henriette S. M. Cramer, Vanessa Evers, Tim van Slo...
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...