Sciweavers

10021 search results - page 1717 / 2005
» Adaptive information extraction
Sort
View
127
Voted
SI3D
2010
ACM
15 years 11 months ago
Spatio-temporal upsampling on the GPU
Pixel processing is becoming increasingly expensive for real-time applications due to the complexity of today’s shaders and highresolution framebuffers. However, most shading re...
Robert Herzog, Elmar Eisemann, Karol Myszkowski, H...
TEI
2010
ACM
99views Hardware» more  TEI 2010»
15 years 10 months ago
Whack gestures: inexact and inattentive interaction with mobile devices
We introduce Whack Gestures, an inexact and inattentive interaction technique. This approach seeks to provide a simple means to interact with devices with minimal attention from t...
Scott E. Hudson, Chris Harrison, Beverly L. Harris...
EDBTW
2010
Springer
15 years 10 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
AINA
2009
IEEE
15 years 10 months ago
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks
— Wireless sensor network consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited po...
Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong ...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 10 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
« Prev « First page 1717 / 2005 Last » Next »