Sciweavers

689 search results - page 83 / 138
» Program transformations for information personalization
Sort
View
CHI
1995
ACM
15 years 6 months ago
Applying Electric Field Sensing to Human-Computer Interfaces
A non-contact sensor based on the interaction of a person with electric fields for human-computer interface is investigated. Two sensing modes are explored: an external electric f...
Thomas G. Zimmerman, Joshua R. Smith, Joseph A. Pa...
138
Voted
PAMI
2006
243views more  PAMI 2006»
15 years 2 months ago
Dynamical Statistical Shape Priors for Level Set-Based Tracking
In recent years, researchers have proposed to introduce statistical shape knowledge into level set based segmentation methods in order to cope with insufficient low-level informati...
Daniel Cremers
155
Voted
DSN
2011
IEEE
14 years 2 months ago
Approximate analysis of blocking queueing networks with temporal dependence
—In this paper we extend the class of MAP queueing networks to include blocking models, which are useful to describe the performance of service instances which have a limited con...
Vittoria de Nitto Persone, Giuliano Casale, Evgeni...
ENTCS
2006
128views more  ENTCS 2006»
15 years 2 months ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi
DRM
2005
Springer
15 years 8 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi