منابع مشابه
Spying with the Crowd
The cooperative power of crowd workers has been recently shown to be effective in solving large-scale diverse tasks. We elaborately study one such application of collaborative crowdsourcing. In this paper, we discuss the viability and different facets of crowdspying, activity of spying with the power of crowd workers. This type of citizen involvement has diverse applications that also includes ...
متن کاملSpying on the environment.
This paper provides a review of the literature on the nervous system involvement incurred by children and adolescents with chronic kidney disease (CKD), with a particular focus on neuropsychological functioning. In addition to an historical overview of earlier literature, published studies from the past 14 years that address both central and peripheral nervous system function in children with C...
متن کاملDeep-Spying: Spying using Smartwatch and Deep Learning
Wearable technologies are today on the rise, becoming more common and broadly available to mainstream users. In fact, wristband and armband devices such as smartwatches and fitness trackers already took an important place in the consumer electronics market and are becoming ubiquitous. By their very nature of being wearable, these devices, however, provide a new pervasive attack surface threaten...
متن کاملSafety and Comfort of Eyeglass Displays
eyeglass displays, user studies, health and safety An eyeglass display features two micro displays and both eyes are presented with the same image. This configuration is safer than virtual reality helmets, which give rise to severe vision problems and nausea. They are also safer than monocular displays, which impair judgement of distance, speed and size. Current eyeglass display products are oc...
متن کاملspying with bots
[email protected] D U R I N G T H E P A S T F E W Y E A R S , W E have seen a shift in how systems are being attacked. After a successful compromise, a bot (also referred to as a zombie or drone) is often installed on the system. This small program provides a remote control mechanism to command the victim. Via this remote control mechanism, the attacker is able to issue arbitra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Fashion Studies
سال: 2018
ISSN: 2371-3453
DOI: 10.38055/fs010102