Sciweavers

2503 search results - page 171 / 501
» Building Computer Network Attacks
Sort
View
MOBISYS
2004
ACM
16 years 1 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
PERCOM
2003
ACM
16 years 1 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...
AINA
2007
IEEE
15 years 8 months ago
Un-biasing the Link Farm Effect in PageRank Computation
Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
Arnon Rungsawang, Komthorn Puntumapon, Bundit Mana...
IJCV
2007
134views more  IJCV 2007»
15 years 1 months ago
Multi-sensory and Multi-modal Fusion for Sentient Computing
This paper presents an approach to multi-sensory and multi-modal fusion in which computer vision information obtained from calibrated cameras is integrated with a large-scale sent...
Christopher Town
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
15 years 10 months ago
A Probabilistic-Based Design Methodology for Nanoscale Computation
As current silicon-based techniques fast approach their practical limits, the investigation of nanoscale electronics, devices and system architectures becomes a central research p...
R. Iris Bahar, Joseph L. Mundy, Jie Chen