Sciweavers

759 search results - page 81 / 152
» What Can Be Implemented Anonymously
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
NORDICHI
2004
ACM
14 years 3 months ago
Adaptivity in speech-based multilingual e-mail client
In speech interfaces users must be aware what can be done with the system – in other words, the system must provide information to help the users to know what to say. We have ad...
Esa-Pekka Salonen, Mikko Hartikainen, Markku Turun...
ICCV
1995
IEEE
14 years 1 months ago
Closed-World Tracking
A new approach to tracking weakly modeled objects in a semantically rich domain is presented. We define a closed-world as a space-time region of an image sequence in which the co...
Stephen S. Intille, Aaron F. Bobick
USENIX
1990
13 years 11 months ago
swm: An X Window Manager Shell
swm is a policy-free, user configurable window manager client for the X Window System. Besides providing basic window manager functionality, swm introduces new features not found ...
Thomas E. LaStrange
IDA
2000
Springer
13 years 9 months ago
Supervised model-based visualization of high-dimensional data
When high-dimensional data vectors are visualized on a two- or three-dimensional display, the goal is that two vectors close to each other in the multi-dimensional space should als...
Petri Kontkanen, Jussi Lahtinen, Petri Myllymä...