Sciweavers

1272 search results - page 142 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
GW
2005
Springer
242views Biometrics» more  GW 2005»
14 years 2 months ago
Finger Tracking Methods Using EyesWeb
This paper compares different algorithms for tracking the position of fingers in a two-dimensional environment. Four algorithms have been implemented in EyesWeb, developed by DIS...
Anne-Marie Burns, Barbara Mazzarino
OTM
2005
Springer
14 years 2 months ago
Semantic Schema Matching
We view match as an operator that takes two graph-like structures (e.g., XML schemas) and produces a mapping between the nodes of these graphs that correspond semantically to each ...
Fausto Giunchiglia, Pavel Shvaiko, Mikalai Yatskev...
AH
2004
Springer
14 years 2 months ago
Problem Solving with Adaptive Feedback
Abstract. The virtual laboratory (VILAB) supports interactive problem solving in computer science with access to complex software-tools. During the problem solving processes the le...
Rainer Lütticke
ISMIR
2004
Springer
160views Music» more  ISMIR 2004»
14 years 2 months ago
Fast labelling of notes in music signals
We present a new system for the estimation of note attributes from a live monophonic music source, within a short time delay and without any previous knowledge of the signal. The ...
Paul Brossier, Juan Pablo Bello, Mark D. Plumbley