Sciweavers

3582 search results - page 694 / 717
» Designing games with a purpose
Sort
View
ATAL
2008
Springer
13 years 12 months ago
Content-oriented composite service negotiation with complex preferences
In e-commerce, for some cases the service requested by the consumer cannot be fulfilled by the producer. In such cases, service consumers and producers need to negotiate their ser...
Reyhan Aydogan
CASES
2008
ACM
13 years 12 months ago
Reducing pressure in bounded DBT code caches
Dynamic binary translators (DBT) have recently attracted much attention for embedded systems. The effective implementation of DBT in these systems is challenging due to tight cons...
José Baiocchi, Bruce R. Childers, Jack W. D...
CCS
2008
ACM
13 years 12 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
MAMMO
2010
Springer
13 years 12 months ago
Three Digital Mammography Display Configurations: Observer Performance in a Pilot ROC Study
The purpose of this study was to determine if displays that provide more grayscale levels (10bit vs. 8bit) can improve observer performance in breast cancer detection. The study wa...
László K. Tabár, Alfredo S. N...
ASPLOS
2006
ACM
13 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic