Sciweavers

408 search results - page 74 / 82
» Using a Live-In Laboratory for Ubiquitous Computing Research
Sort
View
SOUPS
2009
ACM
14 years 1 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
SDM
2012
SIAM
234views Data Mining» more  SDM 2012»
11 years 9 months ago
Monitoring and Mining Insect Sounds in Visual Space
Monitoring animals by the sounds they produce is an important and challenging task, whether the application is outdoors in a natural habitat, or in the controlled environment of a...
Yuan Hao, Bilson J. L. Campana, Eamonn J. Keogh
ICMI
2003
Springer
166views Biometrics» more  ICMI 2003»
14 years 18 days ago
Georgia tech gesture toolkit: supporting experiments in gesture recognition
Gesture recognition is becoming a more common interaction tool in the fields of ubiquitous and wearable computing. Designing a system to perform gesture recognition, however, can...
Tracy L. Westeyn, Helene Brashear, Amin Atrash, Th...
SIGOPSE
1998
ACM
13 years 11 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
STOC
1993
ACM
264views Algorithms» more  STOC 1993»
13 years 11 months ago
Contention in shared memory algorithms
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of ...
Cynthia Dwork, Maurice Herlihy, Orli Waarts