Ogling, Quizzing, and Spying: The Eyeglass

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spying with the Crowd

The cooperative power of crowd workers has been recently shown to be effective in solving large-scale diverse tasks. We elaborately study one such application of collaborative crowdsourcing. In this paper, we discuss the viability and different facets of crowdspying, activity of spying with the power of crowd workers. This type of citizen involvement has diverse applications that also includes ...

متن کامل

Spying on the environment.

This paper provides a review of the literature on the nervous system involvement incurred by children and adolescents with chronic kidney disease (CKD), with a particular focus on neuropsychological functioning. In addition to an historical overview of earlier literature, published studies from the past 14 years that address both central and peripheral nervous system function in children with C...

متن کامل

Deep-Spying: Spying using Smartwatch and Deep Learning

Wearable technologies are today on the rise, becoming more common and broadly available to mainstream users. In fact, wristband and armband devices such as smartwatches and fitness trackers already took an important place in the consumer electronics market and are becoming ubiquitous. By their very nature of being wearable, these devices, however, provide a new pervasive attack surface threaten...

متن کامل

Safety and Comfort of Eyeglass Displays

eyeglass displays, user studies, health and safety An eyeglass display features two micro displays and both eyes are presented with the same image. This configuration is safer than virtual reality helmets, which give rise to severe vision problems and nausea. They are also safer than monocular displays, which impair judgement of distance, speed and size. Current eyeglass display products are oc...

متن کامل

spying with bots

[email protected] D U R I N G T H E P A S T F E W Y E A R S , W E have seen a shift in how systems are being attacked. After a successful compromise, a bot (also referred to as a zombie or drone) is often installed on the system. This small program provides a remote control mechanism to command the victim. Via this remote control mechanism, the attacker is able to issue arbitra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Fashion Studies

سال: 2018

ISSN: 2371-3453

DOI: 10.38055/fs010102