Sciweavers

784 search results - page 96 / 157
» What would they think
Sort
View
ICRA
2009
IEEE
130views Robotics» more  ICRA 2009»
14 years 2 months ago
Model adaptation with least-squares SVM for adaptive hand prosthetics
— The state-of-the-art in control of hand prosthetics is far from optimal. The main control interface is represented by surface electromyography (EMG): the activation potentials ...
Francesco Orabona, Claudio Castellini, Barbara Cap...
MHCI
2009
Springer
14 years 2 months ago
The mobile Oracle: a tool for early user involvement
This paper describes a novel tool for eliciting user requirements early in the design process of mobile applications. The “Mobile Oracle”, as we have called it, is intended to...
Charlotte Magnusson, Martin Pielot, Margarita Anas...
NORDSEC
2009
Springer
14 years 2 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
MM
2009
ACM
185views Multimedia» more  MM 2009»
14 years 2 months ago
Deep exploration for experiential image retrieval
Experiential image retrieval systems aim to provide the user with a natural and intuitive search experience. The goal is to empower the user to navigate large collections based on...
Bart Thomee, Mark J. Huiskes, Erwin M. Bakker, Mic...
ACSAC
2008
IEEE
14 years 2 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...