Sciweavers

1036 search results - page 132 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
KES
2008
Springer
13 years 7 months ago
A Tabletop Interface Using Controllable Transparency Glass for Collaborative Card-Based Creative Activity
Abstract. Conventional tabletop systems have focused on communication with virtual data, using phicons or physical objects as handles. This approach is versatile, given the full us...
Motoki Miura, Susumu Kunifuji
TODS
2010
108views more  TODS 2010»
13 years 6 months ago
A survey of B-tree locking techniques
: © A survey of B-tree locking techniques Goetz Graefe HP Laboratories HPL-2010-9 storage systems, databases, B-tree, indexes, concurrency control, locking B-trees have been ubiqu...
Goetz Graefe
CHI
2008
ACM
14 years 8 months ago
Chromirror: a real-time interactive mirror for chromatic and color-harmonic dressing
This study presents the "ChroMirror" system, a digital mirror imaging system which helps users select appropriate clothing color combinations. By digitally rendering a m...
Chueh-Min Cheng, Meng-Fang Chung, Ming-Yang Yu, Mi...
SASO
2008
IEEE
14 years 2 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...