Sciweavers

6320 search results - page 1040 / 1264
» Towards Situated Computing
Sort
View
CC
2006
Springer
15 years 8 months ago
Interprocedural Dataflow Analysis in the Presence of Large Libraries
Interprocedural dataflow analysis has a large number of uses for software optimization, maintenance, testing, and verification. For software built with reusable components, the tra...
Atanas Rountev, Scott Kagan, Thomas J. Marlowe
EEE
2004
IEEE
15 years 8 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
CIKM
2006
Springer
15 years 8 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 8 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
FGR
2004
IEEE
105views Biometrics» more  FGR 2004»
15 years 8 months ago
Robust Hand Detection
Vision-based hand gesture interfaces require fast and extremely robust hand detection. Here, we study view-specific hand posture detection with an object recognition method recent...
Mathias Kölsch, Matthew Turk
« Prev « First page 1040 / 1264 Last » Next »