Sciweavers

1092 search results - page 26 / 219
» Located Operators
Sort
View
CHI
2007
ACM
14 years 10 months ago
Shift: a technique for operating pen-based interfaces using touch
Retrieving the stylus of a pen-based device takes time and requires a second hand. Especially for short intermittent interactions many users therefore choose to use their bare fin...
Daniel Vogel, Patrick Baudisch
DIAU
2000
Springer
14 years 2 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...
IPCCC
2006
IEEE
14 years 3 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
AVBPA
1997
Springer
90views Biometrics» more  AVBPA 1997»
14 years 2 months ago
Face Detection by Direct Convexity Estimation
We suggest a novel attentional mechanism for detection of smooth convex and concave objects based on direct processing of intensity values. The operator detects the regions of the ...
Ariel Tankus, Hezy Yeshurun, Nathan Intrator
IWPC
2010
IEEE
13 years 8 months ago
DepDigger: A Tool for Detecting Complex Low-Level Dependencies
We present a tool that identifies complex data-flow dependencies on code-level, based on the measure dep-degree. Low-level dependencies between program operations are modeled by...
Dirk Beyer, Ashgan Fararooy