The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Commodity hardware enables a range of cost-effective ubiquitous computing research, but innovative custom hardware can drive compelling new user experiences. One of the dreams of ubiquitous computing is an ecology of heterogeneous computer systems, built into the environment around us and acting in concert to make our lives easier and more fun. Fundamental to this vision is a movement away from the...
Complex event processing systems detect problems in mission-critical, real-time applications and generate intelligent decisions to modulate the system environment.
What happens if you combine the virtues of software engineering with database engineering? Developers managing the evolution of data-intensive software systems face numerous crucial challenges.
Deterrence, civil defense, collective defense, and arms control were key national security doctrines in the 20th century, and they are being reevaluated now for application to cyberspace.
Implantable medical devices have become increasingly popular, and a growing number are equipped with wireless communications technology to increase their usefulness. However, this could make the devices susceptible to hackers.
The use of parallel and distributed computing systems is essential to meet the ever-increasing computational demands of many scientific and industrial applications. Ibis allows easy programming and deployment of compute-intensive distributed applications, even for dynamic, faulty, and heterogeneous environments.
Topics include a prototype system that turns a user's arm or hand into a keyboard or display screen, a device that could enable high-speed wireless communications in place of many of the wired transmissions currently used in homes and offices, a cyberextortion scheme that targets people who download pornography, and a visualization toolkit for discovering geographic trends that could help fight diseases.
The explosive growth of social multimedia content on the Internet is revolutionizing content distribution and social interaction. It has even led to a new research area, called social multimedia computing.
This first comprehensive empirical study of a search function that originated in China examines its tremendous growth in recent years and its uniquely rich online/offline interactions.
New services such as Facebook Platform, Google Friend Connect, and MySpacelD let third-party sites develop social applications without having to build their own social network. These social-networks connect services increase access to and enrich user data in the Social Web, although they also present several security and privacy challenges.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.