Sciweavers

1997 search results - page 397 / 400
» A Model for Data Leakage Detection
Sort
View
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
14 years 5 months ago
Towards a needle driver robot for radiofrequency ablation of tumors under continuous MRI
— This paper presents an initial design and feasibility study for a 1-DOF Magnetic Resonance Imaging (MRI) compatible needle driver robot for radiofrequency ablation (RFA). This ...
Rebecca Kokes, Kevin Lister, Rao Gullapalli, Bao Z...
ICMI
2005
Springer
164views Biometrics» more  ICMI 2005»
14 years 4 months ago
A user interface framework for multimodal VR interactions
This article presents a User Interface (UI) framework for multimodal interactions targeted at immersive virtual environments. Its configurable input and gesture processing compon...
Marc Erich Latoschik
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 4 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
HICSS
2003
IEEE
214views Biometrics» more  HICSS 2003»
14 years 4 months ago
An Event Driven Approach to Customer Relationship Management in e-Brokerage Industry
Customer Relationship Management (CRM) is critical to the success of a business. Recent work in CRM has focused on the mining of customer-related data and the construction of cust...
Dickson K. W. Chiu, Wesley C. W. Chan, Gary K. W. ...
MICRO
2003
IEEE
166views Hardware» more  MICRO 2003»
14 years 4 months ago
Razor: A Low-Power Pipeline Based on Circuit-Level Timing Speculation
With increasing clock frequencies and silicon integration, power aware computing has become a critical concern in the design of embedded processors and systems-on-chip. One of the...
Dan Ernst, Nam Sung Kim, Shidhartha Das, Sanjay Pa...