Sciweavers

4311 search results - page 733 / 863
» Code Generation for Distributed Systems
Sort
View
UIC
2009
Springer
14 years 4 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICPR
2008
IEEE
14 years 4 months ago
Clip retrieval using multi-modal biometrics in meeting archives
We present a system to retrieve all clips from a meeting archive that show a particular individual speaking, using a single face or voice sample as the query. The system incorpora...
Himanshu Vajaria, Sudeep Sarkar, Rangachar Kasturi
SEMCO
2007
IEEE
14 years 4 months ago
Harnessing Language in Mobile Environments
We describe StartMobile, a prototype system that enables users of cellular telephones and other mobile devices to access information, create information and execute commands on th...
Boris Katz, Gary C. Borchardt, Sue Felshin, Federi...
ISSAC
2007
Springer
99views Mathematics» more  ISSAC 2007»
14 years 4 months ago
Computing monodromy via parallel homotopy continuation
Numerical homotopy continuation gives a powerful tool for the applied scientist who seeks solutions to a system of polynomial equations. Techniques from numerical homotopy continu...
Anton Leykin, Frank Sottile
ESCIENCE
2006
IEEE
14 years 4 months ago
CIMA Based Remote Instrument and Data Access: An Extension into the Australian e-Science Environment
The Common Instrument Middleware Architecture (CIMA) is being used as a core component of a portal based remote instrument access system being developed as an Australian e-Science...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...