Sciweavers

8655 search results - page 324 / 1731
» Challenges for Trusted Computing
Sort
View
121
Voted
DAC
2012
ACM
13 years 6 months ago
Self-aware computing in the Angstrom processor
Addressing the challenges of extreme scale computing requires holistic design of new programming models and systems that support those models. This paper discusses the Angstrom pr...
Henry Hoffmann, Jim Holt, George Kurian, Eric Lau,...
CHI
2003
ACM
16 years 3 months ago
Mobile computing in the retail arena
Although PDAs typically run applications in a "standalone" mode, they are increasingly equipped with wireless communications, which makes them useful in new domains. Thi...
Erica Newcomb, Toni Pashley, John T. Stasko
OSDI
2008
ACM
16 years 3 months ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack
137
Voted
ICPR
2010
IEEE
15 years 10 months ago
Hand Pointing Estimation for Human Computer Interaction Based on Two Orthogonal-Views
Hand pointing has been an intuitive gesture for human interaction with computers. Big challenges are still posted for accurate estimation of finger pointing direction in a 3D spac...
Kaoning Hu, Shaun Canavan, Lijun Yin
106
Voted
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 10 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...