Sciweavers

5600 search results - page 1071 / 1120
» Evaluating affective interactions
Sort
View
EUSAI
2007
Springer
14 years 2 months ago
Portable Wireless Sensors for Object Usage Sensing in the Home: Challenges and Practicalities
A low-cost kit of stick-on wireless sensors that transmit data indicating whenever various objects are being touched or used might aid ubiquitous computing research efforts on rapi...
Emmanuel Munguia Tapia, Stephen S. Intille, Kent L...
GECCO
2007
Springer
211views Optimization» more  GECCO 2007»
14 years 2 months ago
An extremal optimization search method for the protein folding problem: the go-model example
The protein folding problem consists of predicting the functional (native) structure of the protein given its linear sequence of amino acids. Despite extensive progress made in un...
Alena Shmygelska
ACSC
2006
IEEE
14 years 2 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ASWEC
2006
IEEE
14 years 2 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
AUIC
2006
IEEE
14 years 2 months ago
Patternprogrammer: yet another rule-based programming environment for children
Graphical rewrite rules are often used in programming environments for children. These rules consist of two parts: a left-hand side, which is visually matched in the environment, ...
Tim Wright
« Prev « First page 1071 / 1120 Last » Next »