Sciweavers

575 search results - page 59 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SIGGRAPH
1996
ACM
13 years 12 months ago
Flow and Changes in Appearance
An important, largely unexplored area of computer image generation is the simulation of weathering and its effects on appearance. Weathering results from the interaction of the en...
Julie Dorsey, Hans Køhling Pedersen, Pat Ha...
PETRA
2010
ACM
13 years 6 months ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
ACMDIS
2004
ACM
14 years 1 months ago
Making tea: iterative design through analogy
The success of translating an analog or manual practice into a digital interactive system may depend on how well that translation captures not only the functional what and how asp...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 2 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
CLEF
2005
Springer
14 years 1 months ago
A Logic Programming Based Approach to QA@CLEF05 Track
Abstract. In this paper the methodology followed to build a questionanswering system for the Portuguese language is described. The system modules are built using computational ling...
Paulo Quaresma, Irene Pimenta Rodrigues