Sciweavers

4742 search results - page 87 / 949
» The Information Technology Model Curriculum
Sort
View
SACMAT
2005
ACM
15 years 10 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
IWIPS
2007
113views Business» more  IWIPS 2007»
15 years 5 months ago
Cross Cultural Study: Perception, Usage, and Adoption of Technology
The primary goal of the project was to understand the cultural similarities and differences in perception, adoption and usage of technology across three cultures (US, India and Ch...
Apala Lahiri Chavan, Beena Prabhu, Warren Greving
SUM
2010
Springer
15 years 2 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
SIGGRAPH
1996
ACM
15 years 8 months ago
Technologies for Augmented Reality Systems: Realizing Ultrasound-Guided Needle Biopsies
We present a real-time stereoscopic video-see-through augmented reality (AR) system applied to the medical procedure known as ultrasound-guided needle biopsy of the breast. The AR...
Andrei State, Mark A. Livingston, William F. Garre...
WISE
2002
Springer
15 years 9 months ago
Applying the Site Information to the Information Retrieval from the Web
In recent years, several information retrieval methods using information about the Web-links are developed, such as HITS and Trawling. In order to analyze the Web-links dividing i...
Yasuhito Asano, Hiroshi Imai, Masashi Toyoda, Masa...