Sciweavers

5984 search results - page 1148 / 1197
» The Informal Nature of Systems Engineering
Sort
View
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 6 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
JCDL
2011
ACM
228views Education» more  JCDL 2011»
12 years 11 months ago
The ownership and reuse of visual media
This paper presents the results of a study of the ownership and reuse of visual media. A survey was administered to 250 social media-savvy respondents to investigate their attitud...
Catherine C. Marshall, Frank M. Shipman III
TEI
2012
ACM
225views Hardware» more  TEI 2012»
12 years 4 months ago
On-body interaction: armed and dangerous
Recent technological advances in input sensing, as well as ultra-small projectors, have opened up new opportunities for interaction – the use of the body itself as both an input...
Chris Harrison, Shilpa Ramamurthy, Scott E. Hudson
MICCAI
2009
Springer
14 years 9 months ago
Fast and Robust 3-D MRI Brain Structure Segmentation
We present a novel method for the automatic detection and segmentation of (sub-)cortical gray matter structures in 3-D magnetic resonance images of the human brain. Essentially, th...
Michael Wels, Yefeng Zheng, Gustavo Carneiro, M...
CHI
2006
ACM
14 years 9 months ago
A goal-oriented web browser
Many users are familiar with the interesting but limited functionality of Data Detector interfaces like Microsoft's Smart Tags and Google's AutoLink. In this paper we si...
Alexander Faaborg, Henry Lieberman
« Prev « First page 1148 / 1197 Last » Next »