Sciweavers

4163 search results - page 535 / 833
» Enhancing surgical systems
Sort
View
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
15 years 8 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
CSCW
2000
ACM
15 years 8 months ago
Shared walk environment using locomotion interfaces
By sharing data regarding the sensations experienced by individuals, as well as by sharing their knowledge, we are readily able to communicate with each other, and there are possi...
Hiroaki Yano, Haruo Noma, Hiroo Iwata, Tsutomu Miy...
GIS
1999
ACM
15 years 8 months ago
Spatio-Temporal Conceptual Models: Data Structures + Space + Time
Nowadays, many applications need data modeling facilities for the description of complex objects with spatial and/or temporal facilities. Responses to such requirements may be fou...
Christine Parent, Stefano Spaccapietra, Esteban Zi...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 8 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
WETICE
1998
IEEE
15 years 8 months ago
Using Components for Modeling Intelligent and Collaborative Mobile Agents
Intelligence, collaboration and mobility are the main important features in designing agents for electronic commercial systems. But very few systems permit to implement agents whi...
Min-Jung Woo, Jean-Pierre Briot, Jacques Ferber