We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 2,243 results
  1. UBIFSec: Adding DNEFS to UBIFS

    This chapter presents UBIFSec, an implementation of DNEFS with the flash file system UBIFS.We describe our implementation and furthermore integrate...
    Joel Reardon in Secure Data Deletion
    Chapter 2016
  2. Cloud Storage: Background and Related Work

    This chapter begins the part on secure deletion for remote storage. We present details on the characteristics of persistent storage, a model of a...
    Joel Reardon in Secure Data Deletion
    Chapter 2016
  3. Project 3: Using Weather Sensors

    IoT solutions often employ a number of sensors to observe the world around us and while you’ve explored a project with a simple sensor, you have yet...
    Chapter 2016
  4. Project 6: Windows IoT and Arduino

    If you are just starting to work with hardware and IoT solutions, you may not have encountered the world that is Arduino and microcontrollers. These...
    Chapter 2016
  5. Windows 10 IoT Development with Python

    Now that you have a basic understanding of how to use Visual Studio 2015, you can learn more about some of the languages you may encounter when...
    Chapter 2016
  6. Robust Key Management for Secure Data Deletion

    This chapter considers the problem of an unreliable securely deleting storage medium, that is, one that may lose data, expose data, fail to delete...
    Joel Reardon in Secure Data Deletion
    Chapter 2016
  7. Conclusion and Future Work

    This chapter is the conclusive part of this book. We review our contributions and integrate them into our systematization. We present some related...
    Joel Reardon in Secure Data Deletion
    Chapter 2016
  8. Introduction

    This chapter explains the scope, motivation and structure of the book.
    Joel Reardon in Secure Data Deletion
    Chapter 2016
  9. Related Work on Secure Deletion

    This chapter surveys related work and organizes existing solutions in terms of their interfaces. The chapter further presents a taxonomy of...
    Joel Reardon in Secure Data Deletion
    Chapter 2016
  10. Case Study: Approaching the Learning of Kanji Through Augmented Toys in Japan

    Aside from their use in recreation, toys and toy technologies can also be employed in enhanced learning and education. The merging of augmented...
    Kamen Kanev, Itaru Oido, ... Michael Jenkin in Mobile Services for Toy Computing
    Chapter 2015
  11. Mobile Computing Toys: Marketing Challenges and Implications

    Global sales of traditional toys such as dolls, action figures, and role-play games are either flat or shrinking. One of the main reasons for the...
    Tirtha Dhar, Terry Wu in Mobile Services for Toy Computing
    Chapter 2015
  12. Toy Computing Background

    The purpose of this chapter is to provide a background on the fundamental concepts of Toy Computing, including mobile services, physical computing,...
    Laura Rafferty, Brad Kroese, Patrick C. K. Hung in Mobile Services for Toy Computing
    Chapter 2015
  13. Advanced Sound Integration for Toy-Based Computing

    Despite the growing awareness regarding the importance of sound in the human-computer interface and the potential interaction opportunities it can...
    Bill Kapralos, Kamen Kanev, Michael Jenkin in Mobile Services for Toy Computing
    Chapter 2015
  14. Introduction to Toy Computing

    Toys have evolved over the ages from simple dolls and cars to electronic toys, and more recently have been integrating mobile technologies. Toy...
    Laura Rafferty, Patrick C. K. Hung in Mobile Services for Toy Computing
    Chapter 2015
  15. Emerging Human-Toy Interaction Techniques with Augmented and Mixed Reality

    In this book chapter, we will review the emerging technologies that promote extensive interactions between toys and their players. Cutting-edge...
    Jeff K. T. Tang, Jordan Tewell in Mobile Services for Toy Computing
    Chapter 2015
  16. Privacy Requirements in Toy Computing

    This chapter outlines the privacy requirements for a toy computing environment. The unique architecture of toy computing requires consideration of...
    Laura Rafferty, Marcelo Fantinato, Patrick C. K. Hung in Mobile Services for Toy Computing
    Chapter 2015
  17. Toys and Mobile Applications: Current Trends and Related Privacy Issues

    A toy is a product that is intended for play. Common examples of toys include dolls, board games and video games. Based on the reports from the 110th...
    Gary Ng, Michael Chow, André de Lima Salgado in Mobile Services for Toy Computing
    Chapter 2015
  18. Augmented Reality for Mobile Service of Film-Induced Tourism App

    A multitude of tourists seek to travel to scenic spots where popular movies and TV dramas have been filmed. Filming tourism has become a popular...
    Chapter 2015
  19. A Shell-Like Induction Electrical Machine

    This paper proposes to recover the concept of spherical induction electrical machines to conceive a shell-like actuator with multi-DOF...
    João F. P. Fernandes, P. J. Costa Branco in Technological Innovation for Collective Awareness Systems
    Conference paper 2014
  20. Strategies to Improve Synchronous Dataflows Analysis Using Map**s between Petri Nets and Dataflows

    Over the last decades a large variety of dataflow solutions emerged along with the proposed models of computation (MoC), namely the Synchronous...
    José-Inácio Rocha, Octávio Páscoa Dias, Luís Gomes in Technological Innovation for Collective Awareness Systems
    Conference paper 2014
Did you find what you were looking for? Share feedback.