Sciweavers

166 search results - page 8 / 34
» pervasive 2009
Sort
View
MHCI
2009
Springer
14 years 4 months ago
Studying multi-user settings for pervasive games
Whenever a pervasive game has to be developed for a group of children an appropriate multi-user setting has to be found. If the pervasive game does not support the children with a...
Karin Leichtenstern, Elisabeth André
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 11 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
GI
2009
Springer
14 years 3 months ago
Tokenized Interaction Architecture
: Out-of-Home (OOH) advertising is currently advancing into a new era: “pervasive advertising” is one of the buzz words describing a soft change from the traditional push-only ...
Boxian Dong, Bernhard Wally, Alois Ferscha
BIRTHDAY
2009
Springer
14 years 3 months ago
Pervasive Theory of Memory
For many aspects of memory theoretical treatment already exists, in particular for: simple cache construction, store buers and store buer forwarding, cache coherence protocols, o...
Ulan Degenbaev, Wolfgang J. Paul, Norbert Schirmer
CISIS
2009
IEEE
14 years 5 months ago
Pervasive Informatics and Persistent Actimetric Information in Health Smart Homes: From Language Model to Location Model
—This paper presents an approach of location model deriving from language models existing in speech recognition research. The purpose is to applicate existing model in speech rec...
Yannick Fouquet, Jacques Demongeot, Nicolas Vuille...