Sciweavers

562 search results - page 27 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
EDBT
2010
ACM
156views Database» more  EDBT 2010»
15 years 7 months ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...
CHIMIT
2008
ACM
15 years 5 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
PERCOM
2003
ACM
15 years 9 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
MM
2006
ACM
127views Multimedia» more  MM 2006»
15 years 9 months ago
The computational extraction of temporal formal structures in the interactive dance work '22'
In this paper we propose a framework for the computational extraction of time characteristics of a single choreographic work. Computational frameworks can aid in revealing nonsali...
Vidyarani M. Dyaberi, Hari Sundaram, Thanassis Rik...
BMCBI
2010
110views more  BMCBI 2010»
15 years 4 months ago
Discovering local patterns of co - evolution: computational aspects and biological examples
Background: Co-evolution is the process in which two (or more) sets of orthologs exhibit a similar or correlative pattern of evolution. Co-evolution is a powerful way to learn abo...
Tamir Tuller, Yifat Felder, Martin Kupiec