Sciweavers

408 search results - page 7 / 82
» Using a Live-In Laboratory for Ubiquitous Computing Research
Sort
View
ICIP
2009
IEEE
14 years 8 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
FECS
2006
208views Education» more  FECS 2006»
13 years 8 months ago
Integral Learning Pedagogical Technique and Distance Learning applied in Laboratory Classes for Electrical and Computing Enginee
- This paper presents the results of a PhD thesis research, with an innovative proposal for the development of a Technical Laboratory Disciplines in Electrical and Computing Engine...
Paulo Alves Garcia, José Sidnei Colombo Mar...
HUC
2003
Springer
14 years 18 days ago
Evaluation of Visual Notification Cues for Ubiquitous Computing
With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-in...
Peter Tarasewich, Christopher S. Campbell, Tian Xi...
PERVASIVE
2005
Springer
14 years 26 days ago
Physical Browsing Research
Physical browsing is a mobile-device-based interaction method for pervasive computing. In this paper, we describe our research interests and experiences of physical browsing: the ...
Pasi Välkkynen, Timo Tuomisto
MHCI
2004
Springer
14 years 22 days ago
The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid
Sound is an important medium in our lives, but its ephemeral nature can be problematic when people cannot recall something they heard in the past. Motivated by everyday conversatio...
Gillian R. Hayes, Shwetak N. Patel, Khai N. Truong...