Sciweavers

UIC
2009
Springer
14 years 4 months ago
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System
The major surveillance camera manufacturers have begun incorporating wireless networking functionality into their products to enable wireless access. However, the video feeds from ...
Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portman...
UIC
2009
Springer
14 years 4 months ago
Gesture Recognition with a 3-D Accelerometer
Abstract. Gesture-based interaction, as a natural way for human-computer interaction, has a wide range of applications in ubiquitous computing environment. This paper presents an a...
Jiahui Wu, Gang Pan, Daqing Zhang, Guande Qi, Shij...
UIC
2009
Springer
14 years 6 months ago
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
UIC
2009
Springer
14 years 6 months ago
A Framework to Calibrate a MEMS Sensor Network
The Smart Surface1 project aims at designing an integrated micro-manipulator based on an array of micromodules connected with a 2D array topology network. Each micromodule comprise...
Kahina Boutoustous, Eugen Dedu, Julien Bourgeois
UIC
2009
Springer
14 years 6 months ago
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning
Abstract. In the last years, techniques for activity recognition have attracted increasing attention. Among many applications, a special interest is in the pervasive e-Health domai...
Daniele Riboni, Claudio Bettini
UIC
2009
Springer
14 years 6 months ago
Printing in Ubiquitous Computing Environments
Document printing has long been considered an indispensable part of the workspace. While this process is considered trivial and simple for environments where resources are ample (e...
Athanasios Karapantelakis, Alisa Devlic, Mohammad ...
UIC
2009
Springer
14 years 6 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...