Sciweavers

576 search results - page 94 / 116
» From creating virtual gestures to
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 4 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ISMAR
2008
IEEE
14 years 4 months ago
Fast annotation and modeling with a single-point laser range finder
This paper presents methodology for integrating a small, singlepoint laser range finder into a wearable augmented reality system. We first present a way of creating object-align...
Jason Wither, Christopher Coffin, Jonathan Ventura...
BIBM
2007
IEEE
144views Bioinformatics» more  BIBM 2007»
14 years 4 months ago
Kinetic Modeling Using BioPAX Ontology
Thousands of biochemical interactions are available for download from curated databases such as Reactome, Pathway Interaction Database and other sources in the Biological Pathways...
Oliver Ruebenacker, Ion I. Moraru, James C. Schaff...
ICAC
2007
IEEE
14 years 4 months ago
Autonomous Return on Investment Analysis of Additional Processing Resources
As the use of virtualization and partitioning grows, it becomes possible to deploy a multi-tier web-based application with a variable amount of computing power. This introduces th...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
A Ubiquitous Context-Aware Environment for Surgical Training
— The age of technology has changed the way that surgeons are being trained. Traditional methodologies for training can include lecturing, shadowing, apprenticing, and developing...
Patricia Ordonez, Palanivel Balaji Kodeswaran, Vla...