Sciweavers

7504 search results - page 1234 / 1501
» Computing with Action Potentials
Sort
View
CCS
2010
ACM
15 years 8 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
AIED
2007
Springer
15 years 8 months ago
Towards promoting meta-cognition using emotive interface personas within Open-Learner Modelling Environments
: The use of Open-Learner Modelling (OLM) within Intelligent Learning Environments is becoming more common. By allowing learners a greater control over their learning experience, O...
Sylvie Girard
AUTONOMICS
2007
ACM
15 years 8 months ago
Adaptive learning of semantic locations and routes
Abstract. Adaptation of devices and applications based on contextual information has a great potential to enhance usability and mitigate the increasing complexity of mobile devices...
Keshu Zhang, Haifeng Li, Kari Torkkola, Mike Gardn...
CHES
2007
Springer
118views Cryptology» more  CHES 2007»
15 years 8 months ago
AES Encryption Implementation and Analysis on Commodity Graphics Processing Units
Graphics Processing Units (GPUs) present large potential performance gains within stream processing applications over the standard CPU. These performance gains are best realised wh...
Owen Harrison, John Waldron
EMNETS
2007
15 years 8 months ago
Sensor node localisation using a stereo camera rig
In this paper, we use stereo vision processing techniques to detect and localise sensors used for monitoring simulated environmental events within an experimental sensor network t...
Dermot Diamond, Noel E. O'Connor, Alan F. Smeaton,...
« Prev « First page 1234 / 1501 Last » Next »