Back to Results
First PageMeta Content
Robosapien v2 / RoboSapien / Robot / Spykee / Domestic robot / Human–robot interaction / Rovio / Three Laws of Robotics / Social robot / WowWee / Robotics / Technology


D:/Documents and Settings/tamiaka/Desktop/Robots/Paper/paper.dvi
Add to Reading List

Document Date: 2012-09-14 16:56:20


Open Document

File Size: 506,56 KB

Share Result on Facebook

City

Seattle / Berlin / Cambridge / /

Company

The New York Times / IEEE Computer / Gnome Press / IEEE Intelligent Systems / Google / IEEE Intl. / 15th IEEE Intl / Designing Interactive Systems / Las Vegas NV / Designing Privacy-Sensitive Ubiquitous Computing Systems / Eleventh Intl / Intel / The Guardian / Associated Press / /

Country

United States / /

Currency

USD / /

/

Event

Product Issues / /

Facility

University of Washington Paul G. Allen Center Box / TCP port / /

IndustryTerm

household products / wireless home network / ubiquitous computing / wireless network / robot products / wireless trace / console software / wireless communications / compromised devices / ad hoc network / robotic systems / securityconscious products / security technologies / web interface / search engines / cyber-physical systems / ad hoc wireless network / ubiquitous computing applications / wireless mode / communication protocols / home wireless network / e - commerce / console software version / wireless packets / schedule algorithm / wireless range / wireless communication method / remote Internet / /

Movie

D. V / /

MusicAlbum

High / Low / /

OperatingSystem

Microsoft Windows / /

Organization

University of Washington / National Science Foundation / /

Person

Karl Koscher / Tim Kindberg / Hal Perkins / Yuri Kageyama / Cynthia Matuszek / Johnny Can / Tadayoshi Kohno / Detectable / Joshua R. Smith / /

Position

speaker / system administrator for the home environment / Author / spy / designer / representative / D. R. Butcher / /

Product

hearing / /

PublishedMedium

The Guardian / Consumer Reports / IEEE Intelligent Systems / The New York Times / /

Technology

home network / WEP / network using WPA encryption / Information Technology / wireless communications / MAC address / html / 128-bit encryption / encryption / security technologies / Cryptography / key schedule algorithm / networks using WEP encryption / artificial intelligence / WPA encryption / communication protocols / /

URL

http /

SocialTag