Results 1 to 10 of about 5,562,706 (333)

Mobile device use among preschool-aged children in Greece. [PDF]

open access: yesEduc Inf Technol (Dordr), 2022
In the last decade, interactive touchscreen devices have become ubiquitous in young children, and toddlers first experience touchscreen technology before two.
Papadakis S, Alexandraki F, Zaranis N.
europepmc   +2 more sources

The Influence of Mobile Device Type on Camera-Based Monitoring of Neck Movements for Cervical Rehabilitation [PDF]

open access: yesSensors, 2023
We developed a mobile application for cervical rehabilitation that uses a non-invasive camera-based head-tracker sensor for monitoring neck movements. The intended user population should be able to use the mobile application in their own mobile device ...
Maria Francesca Roig-Maimó   +4 more
doaj   +2 more sources

Device-Centric Monitoring for Mobile Device Management [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2016
The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in ...
Luke Chircop   +2 more
doaj   +5 more sources

A Survey of Privacy Vulnerabilities of Mobile Device Sensors [PDF]

open access: yesACM Computing Surveys, 2021
The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and sensitive data captured by them.
Paula Delgado-Santos   +5 more
semanticscholar   +1 more source

>Quality-time-complexity universal intelligence measurement [PDF]

open access: yesInternational Journal of Crowd Science, 2018
Purpose - With development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more and more autonomous and smart. Therefore, there is a growing demand to develop a universal intelligence measurement so
Wen Ji   +5 more
doaj   +3 more sources

UbiMeta: A Ubiquitous Operating System Model for Metaverse

open access: yesInternational Journal of Crowd Science, 2023
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen   +10 more
doaj   +1 more source

High-fidelity point cloud completion with low-resolution recovery and noise-aware upsampling

open access: yesGraphical Models, 2023
Completing an unordered partial point cloud is a challenging task. Existing approaches that rely on decoding a latent feature to recover the complete shape, often lead to the completed point cloud being over-smoothing, losing details, and noisy.
Ren-Wu Li   +4 more
doaj   +1 more source

Adversary Models for Mobile Device Authentication [PDF]

open access: yesACM Computing Surveys, 2020
Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user authentication, strong,
R. Mayrhofer, V. Mohan, S. Sigg
semanticscholar   +1 more source

ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices [PDF]

open access: yes2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2017
We introduce an extremely computation-efficient CNN architecture named ShuffleNet, which is designed specially for mobile devices with very limited computing power (e.g., 10-150 MFLOPs).
Xiangyu Zhang   +3 more
semanticscholar   +1 more source

A review of image and video colorization: From analogies to deep learning

open access: yesVisual Informatics, 2022
Image colorization is a classic and important topic in computer graphics, where the aim is to add color to a monochromatic input image to produce a colorful result.
Shu-Yu Chen   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy