Sciweavers

13224 search results - page 2444 / 2645
» Self-monitoring for Computer Users
Sort
View
CCS
2010
ACM
13 years 8 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
DAGM
2010
Springer
13 years 8 months ago
An Improved Histogram of Edge Local Orientations for Sketch-Based Image Retrieval
Content-based image retrieval requires a natural image (e.g, a photo) as query, but the absence of such a query image is usually the reason for a search. An easy way to express the...
Jose M. Saavedra, Benjamin Bustos
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 8 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
TEI
2010
ACM
129views Hardware» more  TEI 2010»
13 years 8 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
AROBOTS
2008
89views more  AROBOTS 2008»
13 years 8 months ago
A multimode navigation system for an assistive robotics project
Assistive technology is an emerging area, where robotic devices can help individuals with motor disabilities to achieve independence in daily activities. This paper deals with a sy...
Andrea Cherubini, Giuseppe Oriolo, Francesco Macr&...
« Prev « First page 2444 / 2645 Last » Next »