Sciweavers

485 search results - page 87 / 97
» Continuous Spatial Authentication
Sort
View
ISCA
1996
IEEE
99views Hardware» more  ISCA 1996»
13 years 11 months ago
High-Bandwidth Address Translation for Multiple-Issue Processors
In an effort to push the envelope of system performance, microprocessor designs are continually exploiting higher levels of instruction-level parallelism, resulting in increasing ...
Todd M. Austin, Gurindar S. Sohi
WSCG
2004
139views more  WSCG 2004»
13 years 9 months ago
Methods for Indexing Stripes in Uncoded Structured Light Scanning Systems
This paper presents robust methods for determining the order of a sequence of stripes captured in an uncoded structured light scanning system, i.e. where all the stripes are proje...
Alan Robinson, Lyuba Alboul, Marcos A. Rodrigues
GEOINFORMATICA
2007
223views more  GEOINFORMATICA 2007»
13 years 7 months ago
Algorithms for Nearest Neighbor Search on Moving Object Trajectories
Nearest Neighbor (NN) search has been in the core of spatial and spatiotemporal database research during the last decade. The literature on NN query processing algorithms so far d...
Elias Frentzos, Kostas Gratsias, Nikos Pelekis, Ya...
CSCW
2010
ACM
13 years 5 months ago
Infrastructure Time: Long-term Matters in Collaborative Development
This paper addresses the collaborative development of information infrastructure for supporting data-rich scientific collaboration. Studying infrastructure development empirically ...
Helena Karasti, Karen S. Baker, Florence Millerand
IJMMS
2011
104views more  IJMMS 2011»
13 years 2 months ago
Revisiting path steering for 3D manipulation tasks
The law of path steering, as proposed by Accot and Zhai, describes a quantitative relationship between human temporal performance and the path’s spatial characteristics. The ste...
Lei Liu, Jean-Bernard Martens, Robert van Liere