Sciweavers

6106 search results - page 1089 / 1222
» Modes for Software Architectures
Sort
View
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
14 years 3 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
HICSS
2003
IEEE
161views Biometrics» more  HICSS 2003»
14 years 3 months ago
Enhanced Knowledge Management with eXtensible Rule Markup Language
XML has become the standard platform for structured data exchange on the Web. Next concern of Semantic Web is the exchange of rules in markup language form. The rules should be re...
Jae Kyu Lee, Mye M. Sohn
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 3 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 3 months ago
Theory and Evaluation of Human Robot Interactions
Human-robot interaction (HRI) for mobile robots is still in its infancy. Most user interactions with robots have been limited to teleoperation capabilities where the most common i...
Jean Scholtz
HOTOS
2003
IEEE
14 years 3 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
« Prev « First page 1089 / 1222 Last » Next »