Sciweavers

12183 search results - page 2411 / 2437
» Computers under Attacks!
Sort
View
TOCHI
1998
89views more  TOCHI 1998»
13 years 8 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
TVLSI
1998
122views more  TVLSI 1998»
13 years 8 months ago
Algorithm-based low-power transform coding architectures: the multirate approach
—In most low-power VLSI designs, the supply voltage is usually reduced to lower the total power consumption. However, the device speed will be degraded as the supply voltage goes...
An-Yeu Wu, K. J. Ray Liu
TCSV
2002
69views more  TCSV 2002»
13 years 8 months ago
Optimizing channel allocation in a unified video-on-demand system
Unified video-on-demand (UVoD) is a recently proposed architecture that integrates multicast transmission with unicast transmission to improve system efficiency. Streaming channels...
Jack Y. B. Lee
TIP
2002
131views more  TIP 2002»
13 years 8 months ago
Optimal edge-based shape detection
Abstract--We propose an approach to accurately detecting twodimensional (2-D) shapes. The cross section of the shape boundary is modeled as a step function. We first derive a one-d...
Hankyu Moon, Rama Chellappa, Azriel Rosenfeld
TMI
2002
386views more  TMI 2002»
13 years 8 months ago
Tracking Leukocytes In Vivo with Shape and Size Constrained Active Contours
Inflammatory disease is initiated by leukocytes (white blood cells) rolling along the inner surface lining of small blood vessels called postcapillary venules. Studying the number ...
Nilanjan Ray, Scott T. Acton, Klaus Ley
« Prev « First page 2411 / 2437 Last » Next »