Sciweavers

15379 search results - page 264 / 3076
» Protecting users from
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
Efficient Retargeting of Generated Device User-Interfaces
Many pervasive computing systems have been built for using mobile computers to interact with networked devices. To deploy a device's user-interface, several systems dynamical...
Olufisayo Omojokun, Prasun Dewan
IPPS
2007
IEEE
14 years 2 months ago
DejaVu: Transparent User-Level Checkpointing, Migration, and Recovery for Distributed Systems
In this paper, we present a new fault tolerance system called DejaVu for transparent and automatic checkpointing, migration, and recovery of parallel and distributed applications....
Joseph F. Ruscio, Michael A. Heffner, Srinidhi Var...
CIS
2004
Springer
14 years 1 months ago
Automatic Segmentation Technique Without User Modification for 3D Visualization in Medical Images
Abstract. It is necessary to analyze an image from CT or MR and then to segment an image of a certain organ from that of other tissues for 3D (ThreeDimensional) visualization. Ther...
Won Seong, Eui-Jeong Kim, Jong-Won Park
LREC
2008
119views Education» more  LREC 2008»
13 years 9 months ago
Assessing the Costs of Machine-Assisted Corpus Annotation through a User Study
Fixed, limited budgets often constrain the amount of expert annotation that can go into the construction of annotated corpora. Estimating the cost of annotation is the first step ...
Eric K. Ringger, Marc Carmen, Robbie Haertel, Kevi...
FLAIRS
2001
13 years 9 months ago
User-Agent Interactions in Mixed-Initiative Learning
Mixed-initiative learning integrates complementary human and automated reasoning, taking advantage of their respective reasoning styles and computational strengths in order to sol...
Dorin Marcu, Mihai Boicu, Gheorghe Tecuci