Sciweavers

15792 search results - page 45 / 3159
» Computational Abstraction Steps
Sort
View
ITICSE
2006
ACM
14 years 3 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
ICNP
2005
IEEE
14 years 2 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
ISWC
2003
IEEE
14 years 2 months ago
First Steps Towards Handheld Augmented Reality
In this paper we describe the first stand-alone Augmented Reality (AR) system with self-tracking running on an unmodified personal digital assistant (PDA) with a commercial camera...
Daniel Wagner, Dieter Schmalstieg
CVPR
2000
IEEE
14 years 1 months ago
Step towards Sequence-to-Sequence Alignment
This paper presents an approach for establishing correspondencesin time and in space between two differentvideo sequences of the same dynamic scene, recorded by stationary uncalib...
Yaron Caspi, Michal Irani
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
14 years 1 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe