[Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering] Mobile Computing, Applications, and Services Volume 240 || Machine Learning of User Attentions in Sensor Data VisualizationIn this paper, we propose a method for automatically estimating important ...
In Mobile, Ubiquitous, and Intelligent Computing; Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany, 2014; Volume 274, pp. 585-... S DâMello,A Graesser,B Schuller,... 被引量: 0发表: 2011年 Affective computing and intelligent interaction. 4th international ...
In recent years, cloud-based smartphone applications like augmented reality (AR), facial recognition, and object detection have gained popularity because the remote execution of cloud computing may create significant latency and increase back-haul bandwi
Mobile Computing Devices in Higher Education: Student Perspectives on Learning with Cellphones, Smartphones & Social Media. Internet High. Educ. 2013, 19, 18–26. [Google Scholar] [CrossRef] Cheon, J.; Lee, S.; Crooks, S.M.; Song, J. An Investigation of Mobile Learning Readiness in ...
All Special Issues3D Human–Computer Interaction3D Human–Computer Interaction (Volume II)3D User Interfaces and Virtual Reality3D User Interfaces and Virtual Reality—2nd EditionAI for (and by) the PeopleAnimal Centered Computing: Enriching the Lives of AnimalsArtificial Intelligence in Medical Radiation...
Department of Mathematics MATH60026 - MATH70026 Methods for Data Science Years 3/4/5 Coursework - General instructions - please read carefully The goal of this coursework is to analyse datasets using several tools and algorithms introduced in the lecture
Programming of Handheld and Mobile Devices Lecture 2 What is a MID? Rob Pooley Mobile information devices most people probably think of portable devices as intelligent phones or personal digital assistants (PDAs), the distinction is arbitrary. For the purposes of this course we will use the term...
I.J.Kim,E.Y.Choi,D.H.Lee."SecureMobileRFIDSystemAgainstPrivacyandSecurityProblems."ThirdInternationalWorkshoponSecurity,PrivacyandTrustinPervasiveandUbiquitousComputing(SecPerU’07),2007,pp.67-72. Radio-frequencyidentification,http://en.wikipedia/wiki/Rfid ...
“CDH” represents to Computational Diffie–Hellman key exchange, which pertains to obtaining the secret transmitted by Alice or Bob and computing the shared key between them. More specifically, the co-CDH problem can be described as follows. Given two cyclic groups G1,G2 satisfying the relation...
Wireless Networks Different type of wireless networks support mobile computing applications and platforms Wireless Personal Area Networks (Bluetooth, Sensors, UWB, Zigbees) Wireless LANs (802.11 family) Fixed Wireless Local loops Cellular networks 1G to 5G Satellite systems Many Research Issues: short lis...