Sciweavers

4903 search results - page 814 / 981
» The Set Covering Machine
Sort
View
IV
2007
IEEE
143views Visualization» more  IV 2007»
14 years 3 months ago
The Effect of Aesthetic on the Usability of Data Visualization
Aesthetic seems currently under represented in most current data visualization evaluation methodologies. This paper investigates the results of an online survey of 285 participant...
Nick Cawthon, Andrew Vande Moere
SECURWARE
2007
IEEE
14 years 3 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
TABLETOP
2007
IEEE
14 years 3 months ago
High Precision Multi-touch Sensing on Surfaces using Overhead Cameras
We present a method to enable multi-touch interactions on an arbitrary flat surface using a pair of cameras mounted above the surface. Current systems in this domain mostly make ...
Ankur Agarwal, Shahram Izadi, Manmohan Chandraker,...
TASE
2007
IEEE
14 years 3 months ago
Symmetry Reduced Model Checking for B
Symmetry reduction is a technique that can help alleviate the problem of state space explosion in model checking. The idea is to verify only a subset of states from each class (or...
Edd Turner, Michael Leuschel, Corinna Spermann, Mi...
VTC
2007
IEEE
133views Communications» more  VTC 2007»
14 years 3 months ago
An Architecture for Situation-Aware Driver Assistance Systems
Current Driver Assistance Systems merely use a minimum set of information. By using additional information of the environment hazardous situations can be detected earlier, more re...
Matthias Röckl, Patrick Robertson, Korbinian ...