Sciweavers

545 search results - page 74 / 109
» On the design of a pervasive debugger
Sort
View
IJSN
2006
124views more  IJSN 2006»
13 years 7 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
MTA
2002
144views more  MTA 2002»
13 years 7 months ago
Semantic Extraction and Semantics-Based Annotation and Retrieval for Video Databases
Digital video databases have become more pervasive and finding video clips quickly in large databases becomes a major challenge. Due to the nature of video, accessing contents of v...
Yan Liu 0004, Fei Li
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
13 years 7 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
HCI
2009
13 years 5 months ago
Accessing e-Learning Systems via Screen Reader: An Example
The evolution of the Information and Communication Technology (ICT) and the rapid growth of the Internet have impelled the pervasive diffusion of e-Learning systems. This is a grea...
Maria Claudia Buzzi, Marina Buzzi, Barbara Leporin...
CIKM
2010
Springer
13 years 2 months ago
Modeling betweenness for question answering
The gap between the user's information need and query is expanding due to the pervasiveness of Web search. Multimedia question answering is restricted by disjoint infrastruct...
Brandeis Marshall