Sciweavers

5722 search results - page 115 / 1145
» Security Function Interactions
Sort
View
AINA
2007
IEEE
14 years 3 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
RECOMB
2005
Springer
14 years 9 months ago
Modeling the Combinatorial Functions of Multiple Transcription Factors
A considerable fraction of yeast gene promoters are bound by multiple transcription factors. To study the combinatorial interactions of multiple transcription factors is thus impor...
Chen-Hsiang Yeang, Tommi Jaakkola
TEI
2010
ACM
268views Hardware» more  TEI 2010»
14 years 3 months ago
DisplayObjects: prototyping functional physical interfaces on 3d styrofoam, paper or cardboard models
This paper introduces DisplayObjects, a rapid prototyping workbench that allows functional interfaces to be projected onto real 3D physical prototypes. DisplayObjects uses a Vicon...
Eric Akaoka, Tim Ginn, Roel Vertegaal
ICMI
2007
Springer
160views Biometrics» more  ICMI 2007»
14 years 3 months ago
Using the influence model to recognize functional roles in meetings
In this paper, an influence model is used to recognize functional roles played during meetings. Previous works on the same corpus demonstrated a high recognition accuracy using SV...
Wen Dong, Bruno Lepri, Alessandro Cappelletti, Ale...
ACMACE
2008
ACM
13 years 11 months ago
Real binoculars with virtual functions for mixed environments
Though often desirable, the integration of real and virtual elements in mixed reality environments can be difficult. We propose a number of techniques to facilitate scene explorat...
Andrei Sherstyuk, Kin Lik Wang, Anton Treskunov, J...