Sciweavers

846 search results - page 124 / 170
» Integrating Use-Case Analysis and Task Analysis for Interact...
Sort
View
CHI
2005
ACM
14 years 9 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
IEEEVAST
2010
13 years 3 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
RTSS
2006
IEEE
14 years 2 months ago
Tightening the Bounds on Feasible Preemption Points
Caches have become invaluable for higher-end architectures to hide, in part, the increasing gap between processor speed and memory access times. While the effect of caches on timi...
Harini Ramaprasad, Frank Mueller
IKE
2004
13 years 10 months ago
Real-Time Decision Support System for Space Missions Control
- Space weather refers to conditions on the sun and in the solar wind, magnetosphere, ionosphere, and thermosphere that can influence the performance and reliability of space-borne...
João Moura Pires, Marta Pantoquilho, Nuno V...
CVPR
2006
IEEE
14 years 11 months ago
Probabilistic 3D Polyp Detection in CT Images: The Role of Sample Alignment
Automatic polyp detection is an increasingly important task in medical imaging with virtual colonoscopy [15] being widely used. In this paper, we present a 3D object detection alg...
Zhuowen Tu, Xiang Sean Zhou, Luca Bogoni, Adrian B...