Sciweavers

7596 search results - page 269 / 1520
» Challenges in forensic computing
Sort
View
120
Voted
HPCC
2007
Springer
15 years 8 months ago
Resource Aggregation and Workflow with Webcom
Efficient exploitation of the aggregate resources available to a researcher is a challenging and real problem. The challenge becomes all the greater when researchers who collaborat...
Oisín Curran, Paddy Downes, John Cunniffe, ...
136
Voted
HUC
2007
Springer
15 years 8 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...
168
Voted
ECCV
2006
Springer
15 years 8 months ago
A Rao-Blackwellized Parts-Constellation Tracker
We present a method for efficiently tracking objects represented as constellations of parts by integrating out the shape of the model. Parts-based models have been successfully ap...
Grant Schindler, Frank Dellaert
ICPADS
1998
IEEE
15 years 8 months ago
Fault Tolerant All-to-All Broadcast in General Interconnection Networks
With respect to scalability and arbitrary topologies of the underlying networks in multiprogramming and multithread environment, fault tolerance in acknowledged ATAB and concurren...
Yuzhong Sun, Paul Y. S. Cheung, Xiaola Lin, Keqin ...
CHI
1995
ACM
15 years 8 months ago
Designing SpeechActs: Issues in Speech User Interfaces
SpeechActs is an experimental conversational speech system. Experience with redesigning the system based on user feedback indicates the importance of adhering to conversational co...
Nicole Yankelovich, Gina-Anne Levow, Matthew Marx