Sciweavers

847 search results - page 63 / 170
» When Using the Tool Interferes with Doing the Task
Sort
View
TII
2010
124views Education» more  TII 2010»
13 years 2 months ago
Address-Independent Estimation of the Worst-case Memory Performance
Abstract--Real-time systems are subject to temporal constraints and require a schedulability analysis to ensure that task execution finishes within lower and upper specified bounds...
Basilio B. Fraguela, Diego Andrade, Ramon Doallo
FGR
2000
IEEE
386views Biometrics» more  FGR 2000»
14 years 2 days ago
A Virtual 3D Blackboard: 3D Finger Tracking Using a Single Camera
We present a method for tracking the 3D position of a nger, using a single camera placed several meters away from the user. After skin detection, we use motion to identify the ges...
Andrew Wu, Mubarak Shah, Niels da Vitoria Lobo
ICDE
2009
IEEE
132views Database» more  ICDE 2009»
14 years 9 months ago
Using Anonymized Data for Classification
In recent years, anonymization methods have emerged as an important tool to preserve individual privacy when releasing privacy sensitive data sets. This interest in anonymization t...
Ali Inan, Murat Kantarcioglu, Elisa Bertino
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 9 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
SOSP
2005
ACM
14 years 4 months ago
Connections: using context to enhance file search
Connections is a file system search tool that combines traditional content-based search with context information gathered from user activity. By tracing file system calls, Conne...
Craig A. N. Soules, Gregory R. Ganger