Sciweavers

1141 search results - page 118 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
254
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 11 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
VISUALIZATION
1998
IEEE
15 years 8 months ago
Hierarchical volume analysis and visualization based on morphological operators
One common problem in the practical application of volume visualization is the proper choice of transfer functions in order to color different parts of the volume meaningfully. Th...
Christoph Lürig, Thomas Ertl
HUC
2010
Springer
15 years 4 months ago
Accuracy characterization of cell tower localization
Cell tower triangulation is a popular technique for determining the location of a mobile device. However, cell tower triangulation methods require the knowledge of the actual loca...
Jie Yang, Alexander Varshavsky, Hongbo Liu, Yingyi...
PERVASIVE
2007
Springer
15 years 10 months ago
Towards Designing Persuasive Ambient Visualization
This paper discusses an alternative application area for ambient information systems, coined as ‘persuasive visualization’. It investigates the recent evolution of ambient dis...
Andrew Vande Moere
CADE
2009
Springer
16 years 4 months ago
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs
Abstract. An approach based on term rewriting techniques for the automated termination analysis of imperative programs operating on integers is presented. An imperative program is ...
Stephan Falke, Deepak Kapur