Sciweavers

3415 search results - page 670 / 683
» Physical Design Refinement: The
Sort
View
WISEC
2010
ACM
13 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
HUC
2010
Springer
13 years 10 months ago
Augmenting on-screen instructions with micro-projected guides: when it works, and when it fails
We present a study that evaluates the effectiveness of augmenting on-screen instructions with micro-projection for manual task guidance unlike prior work, which replaced screen in...
Stephanie Rosenthal, Shaun K. Kane, Jacob O. Wobbr...
ADHOC
2007
118views more  ADHOC 2007»
13 years 10 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...
BMCBI
2010
173views more  BMCBI 2010»
13 years 10 months ago
The Yeast Resource Center Public Image Repository: A large database of fluorescence microscopy images
Background: There is increasing interest in the development of computational methods to analyze fluorescent microscopy images and enable automated large-scale analysis of the subc...
Michael Riffle, Trisha N. Davis
BMCBI
2007
146views more  BMCBI 2007»
13 years 10 months ago
Spatial location and its relevance for terminological inferences in bio-ontologies
Background: An adequate and expressive ontological representation of biological organisms and their parts requires formal reasoning mechanisms for their relations of physical aggr...
Stefan Schulz, Kornél G. Markó, Udo ...