Sciweavers

271 search results - page 52 / 55
» Scale transformations and information presentation in superv...
Sort
View
WWW
2002
ACM
14 years 8 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
HPDC
2000
IEEE
13 years 11 months ago
dQUOB: Managing Large Data Flows using Dynamic Embedded Queries
The dQUOB system satis es client need for speci c information from high-volume data streams. The data streams we speak of are the ow of data existing during large-scale visualizat...
Beth Plale, Karsten Schwan
CVPR
2009
IEEE
15 years 2 months ago
Echocardiogram View Classification using Edge Filtered Scale-invariant Motion Features
In an 2D echocardiogram exam, an ultrasound probe samples the heart with 2D slices. Changing the orientation and position on the probe changes the slice viewpoint, altering the ...
Ritwik Kumar, Fei Wang, David Beymer, Tanveer Fath...
CHI
2005
ACM
14 years 7 months ago
EyeWindows: evaluation of eye-controlled zooming windows for focus selection
In this paper, we present an attentive windowing technique that uses eye tracking, rather than manual pointing, for focus window selection. We evaluated the performance of 4 focus...
David Fono, Roel Vertegaal
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 1 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...