Sciweavers

2990 search results - page 406 / 598
» Thresholding for Change Detection
Sort
View
PERCOM
2003
ACM
16 years 4 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ICCAD
2005
IEEE
83views Hardware» more  ICCAD 2005»
16 years 1 months ago
Post-placement rewiring and rebuffering by exhaustive search for functional symmetries
Separate optimizations of logic and layout have been thoroughly studied in the past and are well documented for common benchmarks. However, to be competitive, modern circuit optim...
Kai-Hui Chang, Igor L. Markov, Valeria Bertacco
ICDE
2010
IEEE
199views Database» more  ICDE 2010»
15 years 11 months ago
Mining mutation chains in biological sequences
— The increasing infectious disease outbreaks has led to a need for new research to better understand the disease’s origins, epidemiological features and pathogenicity caused b...
Chang Sheng, Wynne Hsu, Mong-Li Lee, Joo Chuan Ton...
CHI
2010
ACM
15 years 11 months ago
InAir: sharing indoor air quality measurements and visualizations
This paper describes inAir, a tool for sharing measurements and visualizations of indoor air quality within one’s social network. Poor indoor air quality is difficult for humans...
Sunyoung Kim, Eric Paulos
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 11 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...