Sciweavers

45 search results - page 3 / 9
» Usage Guidelines for CIECAM97s
Sort
View
SRDS
2007
IEEE
14 years 12 days ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
ITC
2000
IEEE
74views Hardware» more  ITC 2000»
13 years 10 months ago
A good excuse for reuse: "open" TAP controller design
In this paper we present a design for IEEE 1149.1 Test Access Port (TAP)controllers that is based on a practical reuse methodology. While the basic use and core functionality of T...
David B. Lavo
CHI
2005
ACM
14 years 6 months ago
Incorporating physical co-presence at events into digital social networking
As mobile devices become location-aware, it will become possible to know when people are physically co-located and to incorporate this information into social software. Is this va...
Scott Counts, John Geraci
IJON
2000
69views more  IJON 2000»
13 years 6 months ago
PARALLEL NEUROSYS: A system for the simulation of very large networks of biologically accurate neurons on parallel computers
We present a software package for the simulation of very large neuronal networks on parallel computers. The package can be run on any system with an implementation of the Message ...
Peter Pacheco, Marcelo Camperi, Toshi Uchino
RECSYS
2010
ACM
13 years 6 months ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu