Sciweavers

1470 search results - page 156 / 294
» DEFACTO: A Design Environment for Adaptive Computing Technol...
Sort
View
AUSFORENSICS
2003
15 years 5 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
CVPR
1998
IEEE
16 years 6 months ago
Using Adaptive Tracking to Classify and Monitor Activities in a Site
We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
TC
2008
15 years 4 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ACMACE
2009
ACM
15 years 11 months ago
Towards tailoring player experience in physical Wii games: a case study on relaxation
In this study we construct an artificial neural network model of players’ relaxation preferences while playing a physical Wii game. Developed technology will assist game designe...
Patrick Jarnfelt, Sebbe Selvig, Dajana Dimovska
DAC
2011
ACM
14 years 4 months ago
Supervised design space exploration by compositional approximation of Pareto sets
Technology scaling allows the integration of billions of transistors on the same die but CAD tools struggle in keeping up with the increasing design complexity. Design productivit...
Hung-Yi Liu, Ilias Diakonikolas, Michele Petracca,...