By Topic

Human-Centric Computing (HumanCom), 2010 3rd International Conference on

Date 11-13 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 54
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • HumanCom Message from the General Chair

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • HumanCom Message from the Program Chairs

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • HumanCom Organization

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Message from CIA Organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • CIA Organization

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Welcome message from F2G Organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • F2G Organization

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Welcome message from IWECO Organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • IWECO Organization

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • A Multi-Application Controller for a Tiled Display Wall for Wide-Area Distributed Computing

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    Recently, both networking and high-performance computing technologies have dramatically advanced. As a result, scientists can access large-scale data captured by scientific measurement devices with ease. Also, recent high-performance computing technologies such as the Grid and cloud computing have allowed scientists to use huge computational power harnessed on the Internet for their analysis of sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposed Authentication Protocol for Mobile Users of WiMAX Networks

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Recently, many authentication mechanisms have been proposed to provide security in WiMAX networks. Accessing information securely from any device, anywhere, anytime is becoming an increasingly important requirement for Human Centric Computing (HCC) environments. High mobility of end-users makes typical authentication procedures a challenging task. A novel EAP-TLS-ECDH-RSA-based authentication prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Visual Servoing and Navigation Algorithm for an Omnidirectional Robot

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    This paper presents a simple visual servoing and navigation algorithm for guiding a holonomic or omnidirectional robot. The algorithm facilitates a mobile robot equipped mainly with a webcam to autonomously navigate an unknown environment and explore the path from start configuration to goal configuration along some checkpoints while avoiding obstacles. We have adopted an off-the-shelf toy robot, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A Study about Implement of Digital Etching Style Interactive Art

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1825 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on a Carving Method for Deleted NTFS Compressed Files

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1185 KB) | HTML iconHTML

    File carving is a method that recovers files at unallocated space without any file information and used to recover data and execute a digital forensic investigation. In general, the file carving recovers files using the inherent header and footer in files or the entire file size determined in the file header. NTFS supports a compression function for internal files itself. However, the NTFS compres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Multi-Touch Interface for Game

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1043 KB) | HTML iconHTML

    Recently, various methods related with the multi-touch technologies have been proposed and multi-touch interface is being applied in the field of game. Multi-touch interface overcome the limit for control of game and it can offer game of various contents to users. In this paper, we understand multi-touch interface and by implementing the game based on the multi-touch interface, we suggest the dire... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User-Centric Approach for Social Data Integration and Recommendation

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    It is difficult for online users to keep track of their social friendships and friends' social activities scattered across different social networking sites. We propose a user-centric approach for integrating social data from different social networking sites and allowing users to create personalized social and semantic contexts for their social data. Users can blend and group friends on different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User-Centric Approach to Assessing Confidentiality and Integrity of Service-Based Workflows

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    In service-based systems (SBS), workflows are composed of loosely coupled services. The quality of service (QoS) of composite service-based workflows needs to be considered. In doing so, various aspects of the QoS of these workflows need to be assessed. In this paper, a user-centric approach is presented to assessing the confidentiality and integrity of service-based workflows, given the QoS of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent Based Object Recognition System for Autonomous Surveillance in Dynamic Environments

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Autonomous Surveillance is an important term in order to produce pervasive, ubiquitous, homenet, telemetics and other application purposes. However, many surveillance systems are annoyed with some environmental hazards like illumination and others. This paper presents a novel method for non-intrusive biometric vision system for the surveillance having the prior knowledge about environment. As an e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for Web Search User Interface Based on the Cognitive Synonyms Concept

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1260 KB) | HTML iconHTML

    The approaches used in various web search tools to communicate with the user are exposed. Different search request and resulting information representation models depending on subject domain are analyzed. The approach to organize interaction with users for better attenuation of user needs oriented to semantic query modification based on the query token network and cognitive synonyms tree is introd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Agent-Based Routing Scheme Supporting Multiple Mobile Sinks in WSNs

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Mobile sink brings new challenges to densely deployed and large wireless sensor networks (WSNs). When the sink moves, frequent location updates from the sink can generate excessive power consumption of sensors. In this paper, we propose IAR, an Intelligent Agent-based Routing protocol that provides efficient data delivery to mobile sink. Proposed algorithm reduces signal overhead and improve degra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication Protocol Using Authorization Ticket in Mobile Network Service Environment

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    A ubiquitous network environment is a system where the user can access network services anytime, anywhere. Studies are continuously being conducted on wireless communication technology and mobile devices to establish such an environment. The company that provides such services, at a charge to users, should have an established system for authentication and authorization. This service is referred to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Posture Segmentation in Continuous Finger Spelling Recognition

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Recognizing continuous finger spelling plays an important role in understanding sign language. There are two major phases in recognizing continuous finger spelling, which are posture segmentation and posture recognition. In the former, a continuous gesture sequence is decomposed into segments, which are then used for the latter to identify corresponding characters. Among all the segments, beside v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Border Security: Supplementing Human Intelligence in a Sensor Network Using Sequential Pattern Mining

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and sometimes triggered by random events which are considered false alarms. The intent of this project is to supplement human intelligence in a sensor network framework that can assist i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.