Sciweavers

15251 search results - page 2838 / 3051
» Network Science - Theory and Application
Sort
View
ACSAC
2006
IEEE
15 years 7 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
AICT
2006
IEEE
123views Communications» more  AICT 2006»
15 years 7 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...
AMT
2006
Springer
107views Multimedia» more  AMT 2006»
15 years 7 months ago
An Intelligent Process Monitoring System in Complex Manufacturing Environment
In high-tech industries, most manufacturing processes are complexly intertwined, in that manufacturers or engineers can hardly control a whole set of processes. They are only capa...
Sung Ho Ha, Boo-Sik Kang
AUIC
2004
IEEE
15 years 7 months ago
Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?
In the not too distant future Intelligent Creatures (robots, smart devices, smart vehicles, smart buildings, etc) will share the everyday living environment of human beings. It is...
Brendan Bartlett, Vladimir Estivill-Castro, Stuart...
CLUSTER
2004
IEEE
15 years 7 months ago
JuxtaView - a tool for interactive visualization of large imagery on scalable tiled displays
JuxtaView is a cluster-based application for viewing ultra-high-resolution images on scalable tiled displays. We present in JuxtaView, a new parallel computing and distributed mem...
Naveen K. Krishnaprasad, Venkatram Vishwanath, Sha...
« Prev « First page 2838 / 3051 Last » Next »