Sciweavers

77 search results - page 15 / 16
» A User Authentication System Using Schema of Visual Memory
Sort
View
IPPS
2005
IEEE
14 years 28 days ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
KDD
2002
ACM
179views Data Mining» more  KDD 2002»
14 years 7 months ago
From Data To Insight: The Community Of Multimedia Agents
Multimedia Data Mining requires the ability to automatically analyze and understand the content. The Community of Multimedia Agents project (COMMA) is devoted to creating an open ...
Gang Wei, Valery A. Petrushin, Anatole Gershman
WSCG
2004
242views more  WSCG 2004»
13 years 8 months ago
Hand Gesture Recognition for Human-Machine Interaction
Even after more than two decades of input devices development, many people still find the interaction with computers an uncomfortable experience. Efforts should be made to adapt c...
Elena Sánchez-Nielsen, Luis Antón-Ca...
AVI
2004
13 years 8 months ago
Scalable Fabric: flexible task management
Our studies have shown that as displays become larger, users leave more windows open for easy multitasking. A larger number of windows, however, may increase the time that users s...
George G. Robertson, Eric Horvitz, Mary Czerwinski...
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl