Sciweavers

2945 search results - page 529 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ICMI
2003
Springer
133views Biometrics» more  ICMI 2003»
15 years 9 months ago
Mouthbrush: drawing and painting by hand and mouth
We present a novel multimodal interface which permits users to draw or paint using coordinated gestures of hand and mouth. A headworn camera captures an image of the mouth and the...
Chi-Ho Chan, Michael J. Lyons, Nobuji Tetsutani
ICSOC
2003
Springer
15 years 9 months ago
Service-Based Distributed Querying on the Grid
Service-based approaches (such as Web Services and the Open Grid Services Architecture) have gained considerable attention recently for supporting distributed application developme...
M. Nedim Alpdemir, Arijit Mukherjee, Norman W. Pat...
DANCE
2002
IEEE
15 years 9 months ago
Towards an Active Network Architecture
Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with “capsulesâ...
David L. Tennenhouse, David Wetherall
CCGRID
2009
IEEE
15 years 9 months ago
Dynamic Provisioning of Virtual Organization Clusters
Virtual Organization Clusters are systems comprised of virtual machines that provide dedicated computing clusters for each individual Virtual Organization. The design of these clu...
Michael A. Murphy, Brandon Kagey, Michael Fenn, Se...
FCCM
2000
IEEE
144views VLSI» more  FCCM 2000»
15 years 8 months ago
Automatic Synthesis of Data Storage and Control Structures for FPGA-Based Computing Engines
Mapping computations written in high-level programming languages to FPGA-based computing engines requires programmers to generate the datapath responsible for the core of the comp...
Pedro C. Diniz, Joonseok Park