Sciweavers

922 search results - page 150 / 185
» We need a research data census
Sort
View
WISEC
2010
ACM
13 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
BMCBI
2008
130views more  BMCBI 2008»
13 years 9 months ago
An enhanced partial order curve comparison algorithm and its application to analyzing protein folding trajectories
Background: Understanding how proteins fold is essential to our quest in discovering how life works at the molecular level. Current computation power enables researchers to produc...
Hong Sun, Hakan Ferhatosmanoglu, Motonori Ota, Yus...
KI
2002
Springer
13 years 9 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
MVA
2002
186views Computer Vision» more  MVA 2002»
13 years 9 months ago
Identifying Body Parts of Multiple People in Multi-Camera Images
In order to track and recognize the movements of multiple people using multiple cameras, each person needs to be segmented and identified in the image of each camera. We propose a...
Masafumi Tominaga, Hitoshi Hongo, Hiroyasu Koshimi...
PLDI
2003
ACM
14 years 2 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik