Sciweavers

25316 search results - page 4820 / 5064
» Computational sensor networks
Sort
View
151
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
CBMS
1999
IEEE
15 years 8 months ago
Decision Support System for Multiuser Remote Microscopy in Telepathology
Recent advances in networking, robotics, and computer technology allow today realtime diagnosis, consultation, and education by using images obtained through remote microscopy. Th...
Dorin Comaniciu, Bogdan Georgescu, Peter Meer, Wen...
DEXAW
1999
IEEE
119views Database» more  DEXAW 1999»
15 years 8 months ago
Structure-Based Similarity Search with Graph Histograms
Objects like road networks, CAD/CAM components, electrical or electronic circuits, molecules, can be represented as graphs, in many modern applications. In this paper, we propose ...
Apostolos Papadopoulos, Yannis Manolopoulos
202
Voted
PLDI
1999
ACM
15 years 8 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
138
Voted
VRML
1999
ACM
15 years 8 months ago
Avatars in LivingSpace
We describe how we implemented the avatars we use to represent users in LivingSpace, our implementation of the Living Worlds standard for multi-user distributed VRML worlds. Livin...
Mike Wray, Vincent Belrose
« Prev « First page 4820 / 5064 Last » Next »