The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The explosion of mobile computing and the sharing of content ubiquitously has enabled users to create and share memories instantly. Access to different data sources, such as location, movement, and physiology, has helped to create a data rich society where new and enhanced memories will form part of everyday life. Peer-to-Peer (P2P) systems have also increased in popularity over the years, due to...
In this paper we describe the achievement of a Context Aware platform capable of collecting contextual user data and also information about users' surrounding context such as relevant Point of Interests. We also analyze the complexity of exploiting a large amount of collected data through a proper interactive system without affecting applications' usability and avoiding information overload. We finally...
Informations sharing in meetings or conference calls are often done by displaying the information on a shared display, e.g. a projected or shared display, or a shared surface as a table. The amount of information on the shared surface may increase, and the clutter makes the relevant information hidden or hard to find. One challenge for current systems is to filter out the information without interest...
We developed new interactive display system called the palm display. Our prototype system shows the image of graphical user interface on the palm and allows the user to have interaction with it using fingertip as they manipulate a common mobile device with stylus pen. We implemented this system using image processing technology and employed common projector and a networked PTZ camera. The feature...
Camera monitoring service is useful for security, caring service for the old and the week, disaster prevention, and so on. In this paper, we discuss the service scenario to support various devices and its issues in ubiquitous computing environment. Also, we propose a framework for camera monitoring service for supporting mobile devices in ubiquitous computing environment.
The proliferation of camera-equipped mobile devices with enhanced mobile computing power and network connectivity results in a rising demand for mobile image search. Although image search has been studied extensively over the last few decades, most existing solutions are based on and optimized for desktop and server platforms, not for mobile devices. In this paper, we address some of the challenging...
With a camera mobile phone, which has become a "must-have" device, 2D-barcode works as an interface to bridge the physical and digital world. As the notion of ubiquitous computing has permeated, developing a new 2D-barcode and its applications has been a growing trend worldwide. A 2D-barcode symbol consists of two broad areas: data area and guide area. The components of the latter is collectively...
Content-based image retrieval (CBIR) on the Web is an active research topic in recent years. However, a common problem for the content-based search is the difficulty for getting a query image, which dramatically limits the popularity of their application. The ubiquity of camera phones has opened up a new avenue for image-based mobile search and it also gives new challenges. In this paper, a domain-specific...
Peeping attacks in the real world are a threat to user authentication. What is worse, an emerging attack method such as video capture makes traditional measures against peeping attack insufficient. This paper presents a unique user authentication scheme named "fakePointer'' as a solution to peeping attacks conducted by video capture. It makes it difficult for attackers to obtain a secret even...
In this paper, we propose a novel user interface framework for controlling appliances in smart spaces based on the natural look of UI on physical appliances. When a user selects a specific target appliance to control, the proposed architecture and procedures provide NVUI (NaturalView User Interface) on a userpsilas mobile device to maximize userpsilas a priori familiarity with the user interface....
QR codes (2D barcodes) are used to encode and decode data at a rapid rate. Using camera phones to read two dimensional barcodes for various purposes is currently a popular topic in both research and in practical applications. But until now, the information provided by QR codes was solely static. What you see is exactly what was encoded. This paper proposes the notion of contextual QR codes that merge...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.